Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe
Resource
win7-20240221-en
General
-
Target
4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe
-
Size
560KB
-
MD5
4a5f7263d5e978024e4d3c7abed82307
-
SHA1
0a8f9bb8e9058beb4bd67ea08b8ef82bc90fcd8c
-
SHA256
4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf
-
SHA512
d843fe704beeb3b61916c789626bc908eed44455a34a86a65994db47c759311aef05c4f2d1530f2f073e99e6bdf3dc2b15944772fee7d161b492e70ba8a09c22
-
SSDEEP
12288:IzxKn6yWn7fcpVZlu/6uHqa9XnWsh9P5u7JwdprNLUgNYGutA:rn698VVYFlRu7J6ZUgNiA
Malware Config
Extracted
xworm
104.250.180.178:7061
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3064-11-0x0000000000400000-0x0000000000414000-memory.dmp family_xworm -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule behavioral2/memory/3064-11-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3620 powershell.exe 3728 powershell.exe 4300 powershell.exe 4560 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2316 set thread context of 3064 2316 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4560 powershell.exe 4560 powershell.exe 3620 powershell.exe 3620 powershell.exe 3728 powershell.exe 3728 powershell.exe 4300 powershell.exe 4300 powershell.exe 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe Token: SeDebugPrivilege 4560 powershell.exe Token: SeDebugPrivilege 3620 powershell.exe Token: SeDebugPrivilege 3728 powershell.exe Token: SeDebugPrivilege 4300 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3064 2316 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 91 PID 2316 wrote to memory of 3064 2316 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 91 PID 2316 wrote to memory of 3064 2316 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 91 PID 2316 wrote to memory of 3064 2316 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 91 PID 2316 wrote to memory of 3064 2316 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 91 PID 2316 wrote to memory of 3064 2316 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 91 PID 2316 wrote to memory of 3064 2316 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 91 PID 2316 wrote to memory of 3064 2316 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 91 PID 3064 wrote to memory of 4560 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 93 PID 3064 wrote to memory of 4560 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 93 PID 3064 wrote to memory of 4560 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 93 PID 3064 wrote to memory of 3620 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 95 PID 3064 wrote to memory of 3620 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 95 PID 3064 wrote to memory of 3620 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 95 PID 3064 wrote to memory of 3728 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 97 PID 3064 wrote to memory of 3728 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 97 PID 3064 wrote to memory of 3728 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 97 PID 3064 wrote to memory of 4300 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 99 PID 3064 wrote to memory of 4300 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 99 PID 3064 wrote to memory of 4300 3064 4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe"C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe"C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe"2⤵
- Checks computer location settings
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4fb48e8fd54c7dba1422489d3312e5c0bde0f8e4d375103c28160403624afabf.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5781f02d34454bbfb0cd82357627fbe65
SHA123e173a3e99b489f177bc389c19b50320ddcef8c
SHA25661777fe570a35d47e51d568dbc050c29fd09a8fbef9af032fcd2b2a82a8bba4c
SHA51235ac27f0377b7f30000ec2518e395c38761d6809fd209c1ea8ff78995eb8a3f7b56e7a6dfe9d274b75eba78241363aad7a714506d396118a8238b6b9dd8b6db2
-
Filesize
18KB
MD561b48b33af356c10c549fb77677dd3d5
SHA13a901035cf0837cb07a759674438746459b87514
SHA25637bbedfa686361c3c3b42175ee230bb89af2f3529ef9fd92845ce045bbbffa62
SHA51293e0882dc989fd8b2c1bca308238703a41ffee261dde64c9d8befa1e5dbcabbe76149c9a92a66601bc2cfe991cd28e20d69c880ae841a7e5fd6e262ed76ddb95
-
Filesize
18KB
MD548d7cf87ea05cc35518d9b20fe5392e1
SHA16aeb1e7e1f963f3815c4975db45f5d1107b727d2
SHA2567c92c71e7836d1b71da14c3753d7b506f7f506c051bbf1e3e37a37ff12b691a6
SHA512ad706b793a18c5c05bbd9df6e070b6aa201c3bcf2d4df4eb8b8c53d61188d84e53f77e6294f8842128f09f925a1802f7550e9e8483bb3c97e91327546599590a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82