Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe
Resource
win7-20240903-en
General
-
Target
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe
-
Size
315KB
-
MD5
e16acddcf30e48f1a412228269ec7ee0
-
SHA1
c431b49d1a8c7154a90fff36f97ff28497d1e690
-
SHA256
12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9
-
SHA512
2894d2e44307386aa7c23ae0093a600247b2bc1d5f0342e48fdce05a52adbe4419c64b6de15105ba942130176078773d4e091a212763151f02f9871b62a42e16
-
SSDEEP
3072:ktHIcvIdsE+iSmphsQvPb0dwG3birtHcn0UwGqtUH//F+oYoQN:kx131M5GOdtUHMaQ
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000200000001e91d-14.dat family_xworm behavioral2/memory/4908-15-0x00000000051C0000-0x00000000051D0000-memory.dmp family_xworm behavioral2/memory/1188-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4908 set thread context of 1188 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe Token: SeDebugPrivilege 1188 MSBuild.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4044 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 90 PID 4908 wrote to memory of 4044 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 90 PID 4908 wrote to memory of 4044 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 90 PID 4044 wrote to memory of 2940 4044 csc.exe 92 PID 4044 wrote to memory of 2940 4044 csc.exe 92 PID 4044 wrote to memory of 2940 4044 csc.exe 92 PID 4908 wrote to memory of 5100 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 93 PID 4908 wrote to memory of 5100 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 93 PID 4908 wrote to memory of 5100 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 93 PID 4908 wrote to memory of 2416 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 94 PID 4908 wrote to memory of 2416 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 94 PID 4908 wrote to memory of 2416 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 94 PID 4908 wrote to memory of 1188 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 4908 wrote to memory of 1188 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 4908 wrote to memory of 1188 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 4908 wrote to memory of 1188 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 4908 wrote to memory of 1188 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 4908 wrote to memory of 1188 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 4908 wrote to memory of 1188 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95 PID 4908 wrote to memory of 1188 4908 12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe"C:\Users\Admin\AppData\Local\Temp\12003cfc75b9d076590abcbe3f960e7b64114f229ace64497d28e260ca01a2b9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\o5xbfway\o5xbfway.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAE51.tmp" "c:\Users\Admin\AppData\Local\Temp\o5xbfway\CSC65D34AC69EAE4EAF948143B7CC95C71F.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:5100
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2416
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52472f1b70fdda589eff658d3659bddb0
SHA1d7097f5a45e3b24958aa7d27c3226a585bdcf738
SHA256c6e09ce70311be28c389bcf4aa1dd2e929cb6d1cbec38520451520c5e35051bb
SHA512aea1e716107f7c32d91d19c40fe66a6cc5cd2ad8c678bcfc0665eab2a295093e13c27ed47f5df049a4a89e237239dc16479837ee00b462a0e02476ace5ea5355
-
Filesize
41KB
MD512831141e767238385bfa9b7b0d1ca6d
SHA106693251dadcc0fc9d790a7de383081afe85b464
SHA256b25b12d540882cae621fd8ba27417a0eaf4bd7e5d94775568ea18ab6b63437f9
SHA512556d39f49aab7ae2d775243c509f72768f9d4107aa106251427e01a8d66dbbd30a43e3421150db0aaf7fa9b6f2cde2774aea3adc1d37b76f333c2e39d0f435f6
-
Filesize
652B
MD5f1eb585e7a1c6c99b7bef0b1c838340a
SHA13701ac50d8b355a617a9f2126f562e5c9061c1a4
SHA2564bcc20e65b6e0e165bed302afe763864e062d0d861022e38df5214088378ede4
SHA51200953c512468e3dc4f8cc266dc5c9a12c0805b5d8956b00dad029bc3a508b4b89d300e9364a2cf0893f3df912581a19ee797c780f5aab55dc4de3d26fe7404c8
-
Filesize
101KB
MD5fcb83d623452e1cafbc3b0ad5b3b5b73
SHA1abc26af231584f50ca2ae6de25d4c4764eaf7a9f
SHA256d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc
SHA51241a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8
-
Filesize
204B
MD51f82fcd1d2e7cf9c7f28015df138f6b7
SHA1cc4ddccc826300997766e755638e2981271ba28d
SHA2561081cb6001d8b5a58eae78028e8369f79bf55e5b52970937ee99a42963b7972c
SHA5123a2b89bbd0ef75543b9e49126f323899607e3c7cc93904517a265a8f9d85461a055287fc6150b552cb3f4b70e17d9d3f6be86a8c64b2bac27bfa762130331706