Analysis
-
max time kernel
53s -
max time network
44s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 22:54
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win11-20240412-en
General
-
Target
XClient.exe
-
Size
92KB
-
MD5
5ef9980677f25e6cb352360b525d7d86
-
SHA1
0d804249da416689682838fb37a3aeffe0babbc4
-
SHA256
3e8a75f5d894529a3edc6cf3fb49033d818d798e62f1d2df245408c823099e2a
-
SHA512
07239f774630ed398f8c6ef4c130fef6af14f9f05ad31a2eea6f4825ee381024841be3f24a6a97cb689755a4fef92aeabbc5ffcd11a2880953350e010e7541c4
-
SSDEEP
1536:Rbk9Xr6g05Hhx5yAIj1vwlbeSFGnP0L3B6m5O0QQjPOXw6a1GdS1EAd8IIR:C4NDoIlbdFGIGQjPOXUSgEA6IIR
Malware Config
Extracted
xworm
127.0.0.1:30287
cooking.gl.at.ply.gg:30287
-
Install_directory
%Userprofile%
-
install_file
discord.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/572-0-0x0000000000630000-0x000000000064C000-memory.dmp family_xworm behavioral1/files/0x000900000002a9ff-69.dat family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\discord.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\discord.lnk XClient.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 discord.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-801878912-692986033-442676226-1000\Software\Microsoft\Windows\CurrentVersion\Run\discord = "C:\\Users\\Admin\\discord.exe" XClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5020 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2268 powershell.exe 2268 powershell.exe 4676 powershell.exe 4676 powershell.exe 4776 powershell.exe 4776 powershell.exe 3868 powershell.exe 3868 powershell.exe 572 XClient.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 572 XClient.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 4676 powershell.exe Token: SeDebugPrivilege 4776 powershell.exe Token: SeDebugPrivilege 3868 powershell.exe Token: SeDebugPrivilege 572 XClient.exe Token: SeDebugPrivilege 2764 discord.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 572 XClient.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 572 wrote to memory of 2268 572 XClient.exe 82 PID 572 wrote to memory of 2268 572 XClient.exe 82 PID 572 wrote to memory of 4676 572 XClient.exe 84 PID 572 wrote to memory of 4676 572 XClient.exe 84 PID 572 wrote to memory of 4776 572 XClient.exe 86 PID 572 wrote to memory of 4776 572 XClient.exe 86 PID 572 wrote to memory of 3868 572 XClient.exe 89 PID 572 wrote to memory of 3868 572 XClient.exe 89 PID 572 wrote to memory of 5020 572 XClient.exe 91 PID 572 wrote to memory of 5020 572 XClient.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\discord.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'discord.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "discord" /tr "C:\Users\Admin\discord.exe"2⤵
- Creates scheduled task(s)
PID:5020
-
-
C:\Users\Admin\discord.exeC:\Users\Admin\discord.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD5d0a4a3b9a52b8fe3b019f6cd0ef3dad6
SHA1fed70ce7834c3b97edbd078eccda1e5effa527cd
SHA25621942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31
SHA5121a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b
-
Filesize
944B
MD5050567a067ffea4eb40fe2eefebdc1ee
SHA16e1fb2c7a7976e0724c532449e97722787a00fec
SHA2563952d5b543e5cb0cb84014f4ad9f5f1b7166f592d28640cbc3d914d0e6f41d2e
SHA512341ad71ef7e850b10e229666312e4bca87a0ed9fe25ba4b0ab65661d5a0efa855db0592153106da07134d8fc2c6c0e44709bf38183c9a574a1fa543189971259
-
Filesize
944B
MD5781da0576417bf414dc558e5a315e2be
SHA1215451c1e370be595f1c389f587efeaa93108b4c
SHA25641a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe
SHA51224e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
92KB
MD55ef9980677f25e6cb352360b525d7d86
SHA10d804249da416689682838fb37a3aeffe0babbc4
SHA2563e8a75f5d894529a3edc6cf3fb49033d818d798e62f1d2df245408c823099e2a
SHA51207239f774630ed398f8c6ef4c130fef6af14f9f05ad31a2eea6f4825ee381024841be3f24a6a97cb689755a4fef92aeabbc5ffcd11a2880953350e010e7541c4