Analysis
-
max time kernel
110s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22-03-2023 22:47
General
-
Target
XClient.exe
-
Size
69KB
-
MD5
1b6c19ea6b874a27d9cb23e8c722320b
-
SHA1
9c01c24bd4a23cd6ad1f83701d58e09d81800321
-
SHA256
ec984efbcc8915ef4e2f9decbd844b9a75a1443b78616d750d1e6a4f5a405cec
-
SHA512
75a81d34bc2b63d5251b2e40f1cbd1d4ae1cb63ef7f7204a9d1213aef9104dd2c22704d7e7e3bcce00313a99047337a8ba972f5de171622f68c6212801ccbcfd
-
SSDEEP
1536:Yz0yMVnhj0hmwxGz2bp/XUkgev6nLE4TOOcqwH0p:YzqYhO6b5krev+E4TOOLwUp
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 68 4344 WerFault.exe XClient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
XClient.exedescription pid process Token: SeDebugPrivilege 4344 XClient.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4344 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4344 -s 14802⤵
- Program crash
PID:68
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4728