Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe
Resource
win7-20240903-en
General
-
Target
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe
-
Size
315KB
-
MD5
e16acddcf30e48f1a412228269ec7ee0
-
SHA1
c431b49d1a8c7154a90fff36f97ff28497d1e690
-
SHA256
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9
-
SHA512
2894d2e44307386aa7c23ae0093a600247b2bc1d5f0342e48fdce05a52adbe4419c64b6de15105ba942130176078773d4e091a212763151f02f9871b62a42e16
-
SSDEEP
3072:ktHIcvIdsE+iSmphsQvPb0dwG3birtHcn0UwGqtUH//F+oYoQN:kx131M5GOdtUHMaQ
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000d000000023c72-14.dat family_xworm behavioral2/memory/2252-15-0x0000000000DE0000-0x0000000000DF0000-memory.dmp family_xworm behavioral2/memory/4900-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 4900 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4900 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1480 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 91 PID 2252 wrote to memory of 1480 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 91 PID 2252 wrote to memory of 1480 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 91 PID 1480 wrote to memory of 4144 1480 csc.exe 93 PID 1480 wrote to memory of 4144 1480 csc.exe 93 PID 1480 wrote to memory of 4144 1480 csc.exe 93 PID 2252 wrote to memory of 4900 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 2252 wrote to memory of 4900 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 2252 wrote to memory of 4900 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 2252 wrote to memory of 4900 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 2252 wrote to memory of 4900 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 2252 wrote to memory of 4900 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 2252 wrote to memory of 4900 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 2252 wrote to memory of 4900 2252 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe"C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jdliaaqv\jdliaaqv.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2BCE.tmp" "c:\Users\Admin\AppData\Local\Temp\jdliaaqv\CSCF3CC7CF151B40BBA4A4D7B2561E75E0.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:4144
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51546c6859119ea9c987a5958550307aa
SHA141850fd71145fadc155ed6458f531755c82bea26
SHA2569d93d6919544da2727a450b61b4405d007bbdd2c48ec412d52c6c94966b6f1c9
SHA512c9780f66dab6f34e4c2eaecbd9e5fd6d4322a9861a893a8dab281e5b58b66b3a4b83a7b34a92f1164b80f01f0b9e41739e1e4a573143fe4a8f5590526f07c854
-
Filesize
41KB
MD5305866e376fa2ed1d39d0682f333bdf4
SHA1025920060767198db291734e400836c8b36ab7b9
SHA25645da3640628a6dbd34e4da76dad332daaf22a7167a5c6e1a67954012992e6ad9
SHA512908d9a00a571b02258c62bc744ca159611382819be7b9e67f5a71b6fe1e7403f3bb9493950c5510e28ec0df0c8442a232444f3428fedbcbbd3591ddbd54c57c1
-
Filesize
652B
MD528d8dddd79a7a11c6e30e204b50050d6
SHA1a77704778eb78727bd075bc5c5c9a6fea9854590
SHA2561679c6c197b6da1c08d49f8c9db0bd910fef3951b25ed341ae9d01e54cf4300f
SHA512cff422c3d19eba33991019bcd92abaa07d8970cc1ad8bbf8f4fd5dac2710a6198d8d8007dd2c8677d441d259ac60765fdbaef6eb6dee3940a86e6fd79ebad369
-
Filesize
101KB
MD5fcb83d623452e1cafbc3b0ad5b3b5b73
SHA1abc26af231584f50ca2ae6de25d4c4764eaf7a9f
SHA256d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc
SHA51241a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8
-
Filesize
204B
MD5ddb12a5d504aaa0b505a630dbbd4424a
SHA1521a24c741cca81857245c80ff73f00a21d53335
SHA256cae2bde0617ec49b87c45457ab06e9b87e87d6bdf82f3bfe728ccae8a0d30c7c
SHA51234eff272d7b501871799b438a8de85e6dbd9ca93f5c818ded8e8f90494eb3451ca7ce0d92ba2dc35aa9ccd6ac0ea5d0b5305dab3ee2745e91c522f9225ce1cf0