Analysis
-
max time kernel
166s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe
Resource
win7-20240221-en
General
-
Target
6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe
-
Size
445KB
-
MD5
40e7f9319d64559c2bc3ab6595f419f3
-
SHA1
4f5da8030b4dcc5774d7e8bd967614e77510dfb1
-
SHA256
6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338
-
SHA512
bd35b27bf7b59d86d7d5eed1854d9b365decb4a56f60eb53364dc9c65a0cd3350b67b6b4580a64f231166267d987aa0654ed043f0ce97e94d1bd8015a03187c5
-
SSDEEP
12288:hkvq31eoWDu5ysKCxGSY1gMGYkR2mf62q4KkrkDFAdq:heqFCu5VKsm1gMGYHmiWkDFAY
Malware Config
Extracted
xworm
104.250.180.178:7061
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral1/memory/2544-11-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm behavioral1/memory/2544-13-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm behavioral1/memory/2544-17-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm behavioral1/memory/2544-20-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm behavioral1/memory/2544-22-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm behavioral1/memory/2528-28-0x00000000026A0000-0x00000000026E0000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe -
Loads dropped DLL 1 IoCs
pid Process 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2528 powershell.exe 2736 powershell.exe 1328 powershell.exe 768 powershell.exe 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 1328 powershell.exe Token: SeDebugPrivilege 768 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 PID 2916 wrote to memory of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 PID 2916 wrote to memory of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 PID 2916 wrote to memory of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 PID 2916 wrote to memory of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 PID 2916 wrote to memory of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 PID 2916 wrote to memory of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 PID 2916 wrote to memory of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 PID 2916 wrote to memory of 2544 2916 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 27 PID 2544 wrote to memory of 2528 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 28 PID 2544 wrote to memory of 2528 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 28 PID 2544 wrote to memory of 2528 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 28 PID 2544 wrote to memory of 2528 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 28 PID 2544 wrote to memory of 2736 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 32 PID 2544 wrote to memory of 2736 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 32 PID 2544 wrote to memory of 2736 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 32 PID 2544 wrote to memory of 2736 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 32 PID 2544 wrote to memory of 1328 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 34 PID 2544 wrote to memory of 1328 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 34 PID 2544 wrote to memory of 1328 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 34 PID 2544 wrote to memory of 1328 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 34 PID 2544 wrote to memory of 768 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 36 PID 2544 wrote to memory of 768 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 36 PID 2544 wrote to memory of 768 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 36 PID 2544 wrote to memory of 768 2544 6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe"C:\Users\Admin\AppData\Local\Temp\6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe"C:\Users\Admin\AppData\Local\Temp\6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD55b7f257970f932a6c6636039e2d6fa85
SHA1b9c0b36a7d197b8d17f475245295384ce0da569b
SHA256dc559814173c3a37209c4ddf08b762803dcdd17190a6de4b71c2663cc6f7afab
SHA512abe38609b3edf4c9b568703dd72d9dd2665dc656df138e90530ed0569b72fef31d633b5b0a81bb50e405b59316b6220c9bd7b472c1dd6d83a7362f64b4c8d0b8
-
Filesize
445KB
MD540e7f9319d64559c2bc3ab6595f419f3
SHA14f5da8030b4dcc5774d7e8bd967614e77510dfb1
SHA2566dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338
SHA512bd35b27bf7b59d86d7d5eed1854d9b365decb4a56f60eb53364dc9c65a0cd3350b67b6b4580a64f231166267d987aa0654ed043f0ce97e94d1bd8015a03187c5