Analysis
-
max time kernel
122s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe
Resource
win7-20240903-en
General
-
Target
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe
-
Size
315KB
-
MD5
e16acddcf30e48f1a412228269ec7ee0
-
SHA1
c431b49d1a8c7154a90fff36f97ff28497d1e690
-
SHA256
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9
-
SHA512
2894d2e44307386aa7c23ae0093a600247b2bc1d5f0342e48fdce05a52adbe4419c64b6de15105ba942130176078773d4e091a212763151f02f9871b62a42e16
-
SSDEEP
3072:ktHIcvIdsE+iSmphsQvPb0dwG3birtHcn0UwGqtUH//F+oYoQN:kx131M5GOdtUHMaQ
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 7 IoCs
resource yara_rule behavioral1/files/0x0007000000016cd3-14.dat family_xworm behavioral1/memory/2280-15-0x0000000000220000-0x0000000000230000-memory.dmp family_xworm behavioral1/memory/2828-21-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2828-23-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2828-27-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2828-31-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2828-29-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2828 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2760 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 30 PID 2280 wrote to memory of 2760 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 30 PID 2280 wrote to memory of 2760 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 30 PID 2280 wrote to memory of 2760 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 30 PID 2760 wrote to memory of 2820 2760 csc.exe 32 PID 2760 wrote to memory of 2820 2760 csc.exe 32 PID 2760 wrote to memory of 2820 2760 csc.exe 32 PID 2760 wrote to memory of 2820 2760 csc.exe 32 PID 2280 wrote to memory of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33 PID 2280 wrote to memory of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33 PID 2280 wrote to memory of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33 PID 2280 wrote to memory of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33 PID 2280 wrote to memory of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33 PID 2280 wrote to memory of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33 PID 2280 wrote to memory of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33 PID 2280 wrote to memory of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33 PID 2280 wrote to memory of 2828 2280 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe"C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\abvcuze0\abvcuze0.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5FFB.tmp" "c:\Users\Admin\AppData\Local\Temp\abvcuze0\CSC1F7361467CC94AEABB1C44738D35BFBC.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50beac84b56732c05f399fe21b0fa71d7
SHA1d31b870bbd0aeabc0ebc9e6150b08299da50628c
SHA2562659b6af05a66ce22d752a1fb61e4169787383b3b81c4c3d109fe943c80a272e
SHA512c51049c72ceb83600b6ee7adf0161441a637565332766f9dae2070ac2a184aa5e5fff1d4c0d0c8e5eb5c6e0320655a69ea60660de8b507a1b722138e9f8038a0
-
Filesize
41KB
MD51828fac02ea5f39cb1adc92b58599b1c
SHA1a4b3e37a71893b71ee738b1fe1ecc5f589d7839b
SHA256a14fd2889a2b347b0beb4b0bafb27d823facd4d3ce35a66733a794ce47276fa7
SHA5129c27380491ff3fb28372446d64af6563598de809b113d823a8c1b5fb1a650088ec4311bacc1f4f23a27187c09054b84e4b1213c1b843e6685a7e1cf9e3784ede
-
Filesize
652B
MD551aa2de4b6a00b2e63c639c265041aa9
SHA169d44ec3ba3cdc1883fba48f30037136bbdfe31e
SHA256a8856dc958184d5facb7760945ede54e3d299897c20246e8151c80e368e19468
SHA5123d83385fba9ef623117ff9d6270f7e1f7b576b358a8255e44fb2ec14dd7fd859fab575039b294ad2e1dfb6c24c93dc472e670eb1129154c957e24a8ffdd8f6d2
-
Filesize
101KB
MD5fcb83d623452e1cafbc3b0ad5b3b5b73
SHA1abc26af231584f50ca2ae6de25d4c4764eaf7a9f
SHA256d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc
SHA51241a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8
-
Filesize
204B
MD561647b1a085373552a1dd14f4bd70138
SHA144e63c1b846242ac2f4ed31c20af793d9154402a
SHA2568ca5ac01431fe12b8ea48e421e5b6a1ab2b63f0ed8523308abaf01f5f2169b54
SHA51264087a3ffb84d9a57e1b085afda938ec189aed9b5a4ee655e817445c1a3a8a3150acef0cc9b1367fc5006e65697c0eb936592b18a20075bf2cc79f4bad0c7169