Analysis
-
max time kernel
1797s -
max time network
1712s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 19:54
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240419-en
General
-
Target
XClient.exe
-
Size
45KB
-
MD5
0307f42608513c36af121c84702682c5
-
SHA1
181760ba80f4adf14191a3c50a9401a22c22b49b
-
SHA256
e4d5387b673bb06e9aafd4d00ff9b1cc7ea7512cc7ff8285299756713331acf5
-
SHA512
a115af4f40aad5f5ea4c9e4ba8355a372e2796ff71149567248f75841622af97581a9cd44761d3f6638095001f20117f9ee14d9833a12e66ea89752166a1f416
-
SSDEEP
768:LIrdDFbRWXhadEUoSFPZAsTd6qOT7MFHFEPG9PyOChLzYuXbH:LgqhAfZAoVJF19PyOC5hXbH
Malware Config
Extracted
xworm
5.0
green-morrison.gl.at.ply.gg:8080
eNeoo75Bjv1LdL1j
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/3924-0-0x00000000008A0000-0x00000000008B2000-memory.dmp family_xworm behavioral1/files/0x000c000000023ba7-10.dat family_xworm -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe -
Executes dropped EXE 29 IoCs
pid Process 3432 XClient.exe 3948 XClient.exe 732 XClient.exe 772 XClient.exe 2008 XClient.exe 5048 XClient.exe 4212 XClient.exe 620 XClient.exe 1356 XClient.exe 3496 XClient.exe 2076 XClient.exe 2260 XClient.exe 4412 XClient.exe 3860 XClient.exe 2760 XClient.exe 5108 XClient.exe 2960 XClient.exe 1788 XClient.exe 2056 XClient.exe 3768 XClient.exe 3096 XClient.exe 2924 XClient.exe 4484 XClient.exe 4568 XClient.exe 2828 XClient.exe 3472 XClient.exe 4888 XClient.exe 3360 XClient.exe 4380 XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3924 XClient.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 3924 XClient.exe Token: SeDebugPrivilege 3924 XClient.exe Token: SeDebugPrivilege 3432 XClient.exe Token: SeDebugPrivilege 3948 XClient.exe Token: SeDebugPrivilege 732 XClient.exe Token: SeDebugPrivilege 772 XClient.exe Token: SeDebugPrivilege 2008 XClient.exe Token: SeDebugPrivilege 5048 XClient.exe Token: SeDebugPrivilege 4212 XClient.exe Token: SeDebugPrivilege 620 XClient.exe Token: SeDebugPrivilege 1356 XClient.exe Token: SeDebugPrivilege 3496 XClient.exe Token: SeDebugPrivilege 2076 XClient.exe Token: SeDebugPrivilege 2260 XClient.exe Token: SeDebugPrivilege 4412 XClient.exe Token: SeDebugPrivilege 3860 XClient.exe Token: SeDebugPrivilege 2760 XClient.exe Token: SeDebugPrivilege 5108 XClient.exe Token: SeDebugPrivilege 2960 XClient.exe Token: SeDebugPrivilege 1788 XClient.exe Token: SeDebugPrivilege 2056 XClient.exe Token: SeDebugPrivilege 3768 XClient.exe Token: SeDebugPrivilege 3096 XClient.exe Token: SeDebugPrivilege 2924 XClient.exe Token: SeDebugPrivilege 4484 XClient.exe Token: SeDebugPrivilege 4568 XClient.exe Token: SeDebugPrivilege 2828 XClient.exe Token: SeDebugPrivilege 3472 XClient.exe Token: SeDebugPrivilege 4888 XClient.exe Token: SeDebugPrivilege 3360 XClient.exe Token: SeDebugPrivilege 4380 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3924 XClient.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3924 wrote to memory of 1740 3924 XClient.exe 90 PID 3924 wrote to memory of 1740 3924 XClient.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Creates scheduled task(s)
PID:1740
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:732
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:620
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
45KB
MD50307f42608513c36af121c84702682c5
SHA1181760ba80f4adf14191a3c50a9401a22c22b49b
SHA256e4d5387b673bb06e9aafd4d00ff9b1cc7ea7512cc7ff8285299756713331acf5
SHA512a115af4f40aad5f5ea4c9e4ba8355a372e2796ff71149567248f75841622af97581a9cd44761d3f6638095001f20117f9ee14d9833a12e66ea89752166a1f416