Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
e16acddcf30e48f1a412228269ec7ee0.exe
Resource
win7-20241010-en
General
-
Target
e16acddcf30e48f1a412228269ec7ee0.exe
-
Size
315KB
-
MD5
e16acddcf30e48f1a412228269ec7ee0
-
SHA1
c431b49d1a8c7154a90fff36f97ff28497d1e690
-
SHA256
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9
-
SHA512
2894d2e44307386aa7c23ae0093a600247b2bc1d5f0342e48fdce05a52adbe4419c64b6de15105ba942130176078773d4e091a212763151f02f9871b62a42e16
-
SSDEEP
3072:ktHIcvIdsE+iSmphsQvPb0dwG3birtHcn0UwGqtUH//F+oYoQN:kx131M5GOdtUHMaQ
Malware Config
Extracted
xworm
5.0
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/1104-15-0x0000000000340000-0x0000000000350000-memory.dmp family_xworm behavioral1/files/0x0007000000016d0c-14.dat family_xworm -
Xworm family
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e16acddcf30e48f1a412228269ec7ee0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1104 e16acddcf30e48f1a412228269ec7ee0.exe 1104 e16acddcf30e48f1a412228269ec7ee0.exe 1104 e16acddcf30e48f1a412228269ec7ee0.exe 1104 e16acddcf30e48f1a412228269ec7ee0.exe 1104 e16acddcf30e48f1a412228269ec7ee0.exe 1104 e16acddcf30e48f1a412228269ec7ee0.exe 1104 e16acddcf30e48f1a412228269ec7ee0.exe 1104 e16acddcf30e48f1a412228269ec7ee0.exe 1104 e16acddcf30e48f1a412228269ec7ee0.exe 1104 e16acddcf30e48f1a412228269ec7ee0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1104 e16acddcf30e48f1a412228269ec7ee0.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1408 1104 e16acddcf30e48f1a412228269ec7ee0.exe 31 PID 1104 wrote to memory of 1408 1104 e16acddcf30e48f1a412228269ec7ee0.exe 31 PID 1104 wrote to memory of 1408 1104 e16acddcf30e48f1a412228269ec7ee0.exe 31 PID 1104 wrote to memory of 1408 1104 e16acddcf30e48f1a412228269ec7ee0.exe 31 PID 1408 wrote to memory of 2364 1408 csc.exe 33 PID 1408 wrote to memory of 2364 1408 csc.exe 33 PID 1408 wrote to memory of 2364 1408 csc.exe 33 PID 1408 wrote to memory of 2364 1408 csc.exe 33 PID 1104 wrote to memory of 2724 1104 e16acddcf30e48f1a412228269ec7ee0.exe 34 PID 1104 wrote to memory of 2724 1104 e16acddcf30e48f1a412228269ec7ee0.exe 34 PID 1104 wrote to memory of 2724 1104 e16acddcf30e48f1a412228269ec7ee0.exe 34 PID 1104 wrote to memory of 2724 1104 e16acddcf30e48f1a412228269ec7ee0.exe 34 PID 1104 wrote to memory of 2744 1104 e16acddcf30e48f1a412228269ec7ee0.exe 35 PID 1104 wrote to memory of 2744 1104 e16acddcf30e48f1a412228269ec7ee0.exe 35 PID 1104 wrote to memory of 2744 1104 e16acddcf30e48f1a412228269ec7ee0.exe 35 PID 1104 wrote to memory of 2744 1104 e16acddcf30e48f1a412228269ec7ee0.exe 35 PID 1104 wrote to memory of 2804 1104 e16acddcf30e48f1a412228269ec7ee0.exe 36 PID 1104 wrote to memory of 2804 1104 e16acddcf30e48f1a412228269ec7ee0.exe 36 PID 1104 wrote to memory of 2804 1104 e16acddcf30e48f1a412228269ec7ee0.exe 36 PID 1104 wrote to memory of 2804 1104 e16acddcf30e48f1a412228269ec7ee0.exe 36 PID 1104 wrote to memory of 2808 1104 e16acddcf30e48f1a412228269ec7ee0.exe 37 PID 1104 wrote to memory of 2808 1104 e16acddcf30e48f1a412228269ec7ee0.exe 37 PID 1104 wrote to memory of 2808 1104 e16acddcf30e48f1a412228269ec7ee0.exe 37 PID 1104 wrote to memory of 2808 1104 e16acddcf30e48f1a412228269ec7ee0.exe 37 PID 1104 wrote to memory of 2824 1104 e16acddcf30e48f1a412228269ec7ee0.exe 38 PID 1104 wrote to memory of 2824 1104 e16acddcf30e48f1a412228269ec7ee0.exe 38 PID 1104 wrote to memory of 2824 1104 e16acddcf30e48f1a412228269ec7ee0.exe 38 PID 1104 wrote to memory of 2824 1104 e16acddcf30e48f1a412228269ec7ee0.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e16acddcf30e48f1a412228269ec7ee0.exe"C:\Users\Admin\AppData\Local\Temp\e16acddcf30e48f1a412228269ec7ee0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5vg31be1\5vg31be1.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF5C.tmp" "c:\Users\Admin\AppData\Local\Temp\5vg31be1\CSC8B62215C66C14BF39BA9949AD187018.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2804
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5b894f9da05f02c3641d9835473cec9da
SHA113e769cbd6460816c81c040f61c06c49aa6f16c5
SHA256d59bf1c06f59e51c8d77eabdae0f74c8f851ff2d9563475e9c6abffebda52f41
SHA5124c90062fb9b31f4bbbf0bcf423dc8eeeb32f27184cf40a1976a502c5b5a9f9046c3965e6247ae30cff04f46c82dc6b874da88593f87c5b4d9c2de03c13165810
-
Filesize
1KB
MD5fd95909df4eb2eb4dc67910b1d28e7eb
SHA1a688c0aacd84a5eb19b51bf87085b814da90e5a2
SHA256952167207b2f7a280c074a108f8a9c682cbe08e2a4051474bfdaabaaa0461de7
SHA51204a147e4da6aead1ddea2bab515b3cc0e41e605b44b5bd1796d38b8584f3d8488e4f4d2808fd57b845a7171f3cbc92b3069d02bb620df1dcbcbe736f3f418c93
-
Filesize
101KB
MD5fcb83d623452e1cafbc3b0ad5b3b5b73
SHA1abc26af231584f50ca2ae6de25d4c4764eaf7a9f
SHA256d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc
SHA51241a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8
-
Filesize
204B
MD59dcf3081ae5a2b33f14931288da23527
SHA18773babb14729dc4c02b96a8263a95b52c881f00
SHA256e1c4e89cc99e7381cc561b7842fe046dee624f8391957b3f90a54867e4e2ae83
SHA5124d3c4a23886a3bb2ff6cbc7b1da53e1f2178bdad90a004b95829a07c16d84dfa826a5b43f8e3fd88b1b3f18afad7a73875ddd7902f08ff02bd3fdf14959a253b
-
Filesize
652B
MD5ff5a59539923036935403f3ddcc4a3f8
SHA1614cd96e59fa0637a97e437f6cfab8f700590261
SHA2566ff1f2d74667590fca981e620e0cb83f6e9390153e0e122590919697c555733c
SHA512b6beb428aca07526923dd2dabd5825745c383b90306b618f0a5a491c13a770072cfc1e08a5af93d534064328ac161832b8d7ccda367876b49173019e8c959a5b