Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe
Resource
win7-20240903-en
General
-
Target
SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe
-
Size
315KB
-
MD5
47db83a48f4ce42a918802f20de2728f
-
SHA1
676554792c422bd78cc6763efc863b52c9c41ac8
-
SHA256
167f580207b3f640e0b68cbd3bf38770f7499c8be0b4f6deddbc7c8d212120bf
-
SHA512
54a99695dba773bae591fba6ac9c5c5c9e9f0742ff1c40ebbc316b32fc8a4738e43515ab1977abe1f560d170023c73bdfcc710aaedc79fa0c1bea5b342e5b694
-
SSDEEP
1536:yzJC0dKuaIOz7Q0gLkUAg4YvRjYEBIU3joFpCm26oq7kd4m4sMXLiIRTCbpvYLsf:ytCmW49aSpgFXm1cC5gYoQN
Malware Config
Extracted
xworm
5.0
92.255.85.66:7000
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000400000001e99a-14.dat family_xworm behavioral2/memory/3188-15-0x0000000002A20000-0x0000000002A30000-memory.dmp family_xworm behavioral2/memory/4964-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3188 set thread context of 4964 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4964 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3188 wrote to memory of 3920 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 96 PID 3188 wrote to memory of 3920 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 96 PID 3188 wrote to memory of 3920 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 96 PID 3920 wrote to memory of 4140 3920 csc.exe 100 PID 3920 wrote to memory of 4140 3920 csc.exe 100 PID 3920 wrote to memory of 4140 3920 csc.exe 100 PID 3188 wrote to memory of 4964 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 101 PID 3188 wrote to memory of 4964 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 101 PID 3188 wrote to memory of 4964 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 101 PID 3188 wrote to memory of 4964 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 101 PID 3188 wrote to memory of 4964 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 101 PID 3188 wrote to memory of 4964 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 101 PID 3188 wrote to memory of 4964 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 101 PID 3188 wrote to memory of 4964 3188 SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.12965.16390.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nqsybgnn\nqsybgnn.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC275.tmp" "c:\Users\Admin\AppData\Local\Temp\nqsybgnn\CSC202759AB92FA4163B5A36314D2FE4FE8.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:4140
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e12d8efe4e7ac6a6416ab27cf7113743
SHA1adcad3244a68e15872dff0e4a1a5f971232c8dda
SHA256f72f6757d9f94b3fc90196022360d1002728bc2c4c4aad2621fc1080b39e29b5
SHA51203c0a501c8af4d96a63125b21594cb3196b70779c0f5254cffc2a432232a8f6d27e66d461acfe9c497e7cc8666333db30414ed81bf3cc4701c8769ece4e869b4
-
Filesize
41KB
MD526d9dd4272f46289614e3cb51feb615b
SHA149f84538b260b02b6a4a329e6425e4671e0bf59f
SHA256e8a9c7906546b1e4a045a776f01e5d0048f09bf0da052bec99e2789c4f70d6d4
SHA512689fbfd0836e05890880c2720c22b536f0af0fd8c241e51613c76a2b8de2673090eb45c1a745f8ad88d6f6814b1ba676035eb4994ccc74cfab3cd47d75e31ccf
-
Filesize
652B
MD5e79244e643b480a09f670080bf589868
SHA14664ce7be0943988d1ce40f0895119d0fb497347
SHA2565eba2ace6d7a2cf4dceec7a557c70d5b8b095bcab3fefbd4e35a3bea58612672
SHA512c55d976da7d8ca5577e4bf0ef561e818fb74a6d085203babf844f4e7e5912b347702aec7dcb18f90a806570ab53952e2f036844d8347a8fd68ecf96e1de5c7b0
-
Filesize
101KB
MD5b7d84d4752fcef0d27c1c6f62d557f7a
SHA192c0d7e926329f5e997f3b9753d9d3db42f18c24
SHA25681f1e49e831871b44b80ef805a6e39d33166acc9f74dfc7e61689d33a2379908
SHA512250f62f087245ffc81b1cd3d0bd0d27748e4cb20c9452c4f97ccd69bf903d275996be8607a6ba05a50bbf089f18ac1423db9074d9845a010ae440037866ea54d
-
Filesize
204B
MD509428b15ab5bd46dc6407449f4197d0f
SHA1f49daf27a7aa1e746748bb6859f3dfb0b3ced87f
SHA256c1577d4531cdc5520ff0a050cb3b1b9504105b1adf550f1055dc7b5fe626d0da
SHA51212dd27aff43bf7c4f320b4f2c0f6a8f6dff5fb7fc187f31a0a8e04710a350f819745fa54e42197a0584dcd795f9b9dd11811e8f259ee76d1ee69bbb0af6a8421