Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 10:15
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240220-en
General
-
Target
XClient.exe
-
Size
78KB
-
MD5
dcb1c6ea097c0b99326a533ef8dcb99c
-
SHA1
0c32ff7d84de2e561fdff0920e4dffefae2a6701
-
SHA256
d56871854edc765cabbec4c94213e48018f06ac3e05ad688aeda733299b8c9e8
-
SHA512
92f6d308aca63a7974ade9a8ebbfcb994ddccbc7e3da016fb94f99d39feb7802e4ab5c3efa7b94212e4d29477470852ea21c4c5a6a920b166f21fb2ef4d6e8a4
-
SSDEEP
1536:qUzKKr1fw6QryHIKyMLqp+WSpNUnFbBf8mDf86MsbwOAOpY97Dfs9ijlzGI:TKe7Q9RMLPvpUFbBUuFwO/q97DHjpGI
Malware Config
Extracted
xworm
provides-reduces.gl.at.ply.gg:6197
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2784-1-0x00000000011F0000-0x000000000120A000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2656 powershell.exe 2588 powershell.exe 2880 powershell.exe 2548 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe -
Executes dropped EXE 1 IoCs
pid Process 2232 afirlu.exe -
Loads dropped DLL 1 IoCs
pid Process 2784 XClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2220 vlc.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2656 powershell.exe 2588 powershell.exe 2880 powershell.exe 2548 powershell.exe 2784 XClient.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe 2232 afirlu.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2220 vlc.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2784 XClient.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 2880 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 2784 XClient.exe Token: 33 1556 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1556 AUDIODG.EXE Token: 33 1556 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1556 AUDIODG.EXE Token: 33 2220 vlc.exe Token: SeIncBasePriorityPrivilege 2220 vlc.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe 2220 vlc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2784 XClient.exe 2232 afirlu.exe 2220 vlc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2656 2784 XClient.exe 29 PID 2784 wrote to memory of 2656 2784 XClient.exe 29 PID 2784 wrote to memory of 2656 2784 XClient.exe 29 PID 2784 wrote to memory of 2588 2784 XClient.exe 31 PID 2784 wrote to memory of 2588 2784 XClient.exe 31 PID 2784 wrote to memory of 2588 2784 XClient.exe 31 PID 2784 wrote to memory of 2880 2784 XClient.exe 33 PID 2784 wrote to memory of 2880 2784 XClient.exe 33 PID 2784 wrote to memory of 2880 2784 XClient.exe 33 PID 2784 wrote to memory of 2548 2784 XClient.exe 35 PID 2784 wrote to memory of 2548 2784 XClient.exe 35 PID 2784 wrote to memory of 2548 2784 XClient.exe 35 PID 2784 wrote to memory of 2232 2784 XClient.exe 39 PID 2784 wrote to memory of 2232 2784 XClient.exe 39 PID 2784 wrote to memory of 2232 2784 XClient.exe 39 PID 2784 wrote to memory of 2220 2784 XClient.exe 42 PID 2784 wrote to memory of 2220 2784 XClient.exe 42 PID 2784 wrote to memory of 2220 2784 XClient.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\afirlu.exe"C:\Users\Admin\AppData\Local\Temp\afirlu.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\alnxlq.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5881⤵
- Suspicious use of AdjustPrivilegeToken
PID:1556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD5f7354ae727a93ad5faaccfddb01e89ad
SHA1bb995a04c5389e14e77f1c6221a29b1b43515c9f
SHA2560376c3fc0723cca598a21d6ce53a7aeb9949ccc36c3ce2f15f7baa9abf099eaa
SHA512ef5eb4a681a36e8e92790ac9cb2fd3df4a60a54e7450c119707dc7cc7a86d13b56935988d5e0ae638e242828d5be67903d7ad0becd621bfd8c0dc288a638227f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53718bc51fd9dc28feea7031d0f3fee15
SHA19663b58e8b8b925f56f629a7a7700541ae52ef4f
SHA256ddbe6a7e2da6091dfa46f9f95fe5017e3fd73f8a5f8366c8764e379c0a322be3
SHA51259902308616aa575821ce052b1eb3c09888bb23b8d440f250f1817396231f03baad49a880ff8378a65e3b0f527dad6ecb630cd53a5d050c399249ebaa150b3e6
-
Filesize
8.6MB
MD59206b155aea722ee2f30ad90b0f2af01
SHA116699e08b05bf96bf84c372277532c98b2f0951c
SHA2562dd2da56922514c37a0119ade975c78077d9d662c76e1908d46425d675f8ea23
SHA512f2d08de1d7a8899ff996d5b3f9155001566bc694d8856571b1a7b406ca8530491aa396502e4c18ef4b3872136752a0288c383b18115c51c6f78c8b5acfae2978