Analysis Overview
SHA256
94b65da2b5cc3728547f892a46e9c48c5d54477d10ea8e210304593acd3568e7
Threat Level: Known bad
The file XClient.exe was found to be: Known bad.
Malicious Activity Summary
Xworm
Xworm family
Detect Xworm Payload
Executes dropped EXE
Checks computer location settings
Drops startup file
Adds Run key to start application
Enumerates physical storage devices
Unsigned PE
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Suspicious use of AdjustPrivilegeToken
Creates scheduled task(s)
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-30 20:08
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-30 20:08
Reported
2024-05-31 11:36
Platform
win10-20240404-en
Max time kernel
1777s
Max time network
1608s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Xworm
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Executes dropped EXE
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\9 = "C:\\Users\\Admin\\AppData\\Roaming\\9" | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 164 wrote to memory of 4924 | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | C:\Windows\System32\schtasks.exe |
| PID 164 wrote to memory of 4924 | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | C:\Windows\System32\schtasks.exe |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\XClient.exe
"C:\Users\Admin\AppData\Local\Temp\XClient.exe"
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "9" /tr "C:\Users\Admin\AppData\Roaming\9"
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | length-desert.gl.at.ply.gg | udp |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.173.189.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| NL | 52.142.223.178:80 | tcp | |
| US | 8.8.8.8:53 | 56.94.73.104.in-addr.arpa | udp |
Files
memory/164-1-0x0000000000530000-0x0000000000546000-memory.dmp
memory/164-0-0x00007FF8C9B73000-0x00007FF8C9B74000-memory.dmp
memory/164-5-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp
memory/164-6-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp
C:\Users\Admin\AppData\Roaming\9
| MD5 | d172c0a4ae3e8cef6a0a910bde62e195 |
| SHA1 | 51139fc633fe81a66c8ed55081f92ec5256bd0bd |
| SHA256 | 94b65da2b5cc3728547f892a46e9c48c5d54477d10ea8e210304593acd3568e7 |
| SHA512 | d82c930a42fd623aeee51007453d201e96110b546f1fb34080fc6d4c1488d71b3828f5f1833d347993444e4d332aa00fbb7b8922fce676d220375470ad0fa467 |
memory/4520-9-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp
memory/4520-11-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9.log
| MD5 | 16c5fce5f7230eea11598ec11ed42862 |
| SHA1 | 75392d4824706090f5e8907eee1059349c927600 |
| SHA256 | 87ba77c13905298acbac72be90949c4fe0755b6eff9777615aa37f252515f151 |
| SHA512 | 153edd6da59beea6cc411ed7383c32916425d6ebb65f04c65aab7c1d6b25443d143aa8449aa92149de0ad8a975f6ecaa60f9f7574536eec6b38fe5fd3a6c6adc |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-30 20:08
Reported
2024-05-31 11:36
Platform
win7-20240220-en
Max time kernel
1766s
Max time network
1559s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Xworm
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Executes dropped EXE
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\9 = "C:\\Users\\Admin\\AppData\\Roaming\\9" | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\XClient.exe
"C:\Users\Admin\AppData\Local\Temp\XClient.exe"
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "9" /tr "C:\Users\Admin\AppData\Roaming\9"
C:\Windows\system32\taskeng.exe
taskeng.exe {A7DD7787-1C2A-4869-8BEA-77510E9072F1} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | length-desert.gl.at.ply.gg | udp |
Files
memory/2036-0-0x000007FEF5FA3000-0x000007FEF5FA4000-memory.dmp
memory/2036-1-0x0000000000210000-0x0000000000226000-memory.dmp
memory/2036-5-0x000007FEF5FA0000-0x000007FEF698C000-memory.dmp
memory/2036-6-0x000007FEF5FA3000-0x000007FEF5FA4000-memory.dmp
C:\Users\Admin\AppData\Roaming\9
| MD5 | d172c0a4ae3e8cef6a0a910bde62e195 |
| SHA1 | 51139fc633fe81a66c8ed55081f92ec5256bd0bd |
| SHA256 | 94b65da2b5cc3728547f892a46e9c48c5d54477d10ea8e210304593acd3568e7 |
| SHA512 | d82c930a42fd623aeee51007453d201e96110b546f1fb34080fc6d4c1488d71b3828f5f1833d347993444e4d332aa00fbb7b8922fce676d220375470ad0fa467 |
memory/2816-10-0x0000000000890000-0x00000000008A6000-memory.dmp
memory/2036-11-0x000007FEF5FA0000-0x000007FEF698C000-memory.dmp
memory/2584-14-0x0000000001110000-0x0000000001126000-memory.dmp
memory/1520-17-0x00000000011F0000-0x0000000001206000-memory.dmp
memory/2236-19-0x00000000012A0000-0x00000000012B6000-memory.dmp
memory/2204-21-0x00000000013C0000-0x00000000013D6000-memory.dmp
memory/1592-23-0x00000000000D0000-0x00000000000E6000-memory.dmp
memory/1996-25-0x0000000000FF0000-0x0000000001006000-memory.dmp
memory/2656-37-0x0000000000140000-0x0000000000156000-memory.dmp
memory/2928-39-0x0000000001180000-0x0000000001196000-memory.dmp
memory/1736-42-0x00000000001F0000-0x0000000000206000-memory.dmp
memory/856-44-0x0000000001140000-0x0000000001156000-memory.dmp
memory/3028-46-0x0000000000380000-0x0000000000396000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-05-30 20:08
Reported
2024-05-31 11:41
Platform
win10v2004-20240508-en
Max time kernel
1751s
Max time network
1170s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Xworm
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Executes dropped EXE
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9 = "C:\\Users\\Admin\\AppData\\Roaming\\9" | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3760 wrote to memory of 2696 | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | C:\Windows\System32\schtasks.exe |
| PID 3760 wrote to memory of 2696 | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | C:\Windows\System32\schtasks.exe |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\XClient.exe
"C:\Users\Admin\AppData\Local\Temp\XClient.exe"
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "9" /tr "C:\Users\Admin\AppData\Roaming\9"
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | length-desert.gl.at.ply.gg | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 89.65.42.20.in-addr.arpa | udp |
Files
memory/3760-0-0x00007FF8010B3000-0x00007FF8010B5000-memory.dmp
memory/3760-1-0x0000000000B10000-0x0000000000B26000-memory.dmp
memory/3760-5-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp
C:\Users\Admin\AppData\Roaming\9
| MD5 | d172c0a4ae3e8cef6a0a910bde62e195 |
| SHA1 | 51139fc633fe81a66c8ed55081f92ec5256bd0bd |
| SHA256 | 94b65da2b5cc3728547f892a46e9c48c5d54477d10ea8e210304593acd3568e7 |
| SHA512 | d82c930a42fd623aeee51007453d201e96110b546f1fb34080fc6d4c1488d71b3828f5f1833d347993444e4d332aa00fbb7b8922fce676d220375470ad0fa467 |
memory/3836-8-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp
memory/3836-10-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp
memory/3760-11-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9.log
| MD5 | 2ff39f6c7249774be85fd60a8f9a245e |
| SHA1 | 684ff36b31aedc1e587c8496c02722c6698c1c4e |
| SHA256 | e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced |
| SHA512 | 1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1 |
Analysis: behavioral4
Detonation Overview
Submitted
2024-05-30 20:08
Reported
2024-05-31 11:45
Platform
win11-20240426-en
Max time kernel
1748s
Max time network
1181s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Xworm
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Executes dropped EXE
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000\Software\Microsoft\Windows\CurrentVersion\Run\9 = "C:\\Users\\Admin\\AppData\\Roaming\\9" | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\9 | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 448 wrote to memory of 4368 | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | C:\Windows\System32\schtasks.exe |
| PID 448 wrote to memory of 4368 | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | C:\Windows\System32\schtasks.exe |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\XClient.exe
"C:\Users\Admin\AppData\Local\Temp\XClient.exe"
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "9" /tr "C:\Users\Admin\AppData\Roaming\9"
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
C:\Users\Admin\AppData\Roaming\9
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | length-desert.gl.at.ply.gg | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/448-0-0x00007FF9486B3000-0x00007FF9486B5000-memory.dmp
memory/448-1-0x0000000000F80000-0x0000000000F96000-memory.dmp
memory/448-5-0x00007FF9486B0000-0x00007FF949172000-memory.dmp
memory/448-6-0x00007FF9486B3000-0x00007FF9486B5000-memory.dmp
memory/448-7-0x00007FF9486B0000-0x00007FF949172000-memory.dmp
C:\Users\Admin\AppData\Roaming\9
| MD5 | d172c0a4ae3e8cef6a0a910bde62e195 |
| SHA1 | 51139fc633fe81a66c8ed55081f92ec5256bd0bd |
| SHA256 | 94b65da2b5cc3728547f892a46e9c48c5d54477d10ea8e210304593acd3568e7 |
| SHA512 | d82c930a42fd623aeee51007453d201e96110b546f1fb34080fc6d4c1488d71b3828f5f1833d347993444e4d332aa00fbb7b8922fce676d220375470ad0fa467 |
memory/3692-11-0x00007FF9486B0000-0x00007FF949172000-memory.dmp
memory/3692-13-0x00007FF9486B0000-0x00007FF949172000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9.log
| MD5 | 2cbbb74b7da1f720b48ed31085cbd5b8 |
| SHA1 | 79caa9a3ea8abe1b9c4326c3633da64a5f724964 |
| SHA256 | e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3 |
| SHA512 | ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9 |