Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 19:39
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240226-en
General
-
Target
XClient.exe
-
Size
77KB
-
MD5
ef4458792b0cb6ac36ec855d8fa22746
-
SHA1
0b1df777312b444dc0fecc83a2961d8184424f29
-
SHA256
378d29703f868965fb7f302df6ba41c86d082457cf1d1ac4a3a03439667ddb8b
-
SHA512
14eaaf133c1a9e863b644962ae48b9c1d46529d8919ef286ca07ee8cc142b28d0bb49683cf85110953f4ca6476415e0286421d2e931b5e259a6cc1b1e6a5ab65
-
SSDEEP
1536:cnEvrcA42wxrCQBvHbzaRnbkEKTwYR564OXHKG2:gQQWbkPw6DOXN2
Malware Config
Extracted
xworm
moving-agenda.gl.at.ply.gg:7000
-
Install_directory
%ProgramData%
-
install_file
conhost.exe
Signatures
-
Detect Xworm Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2276-1-0x0000000000CE0000-0x0000000000CFA000-memory.dmp family_xworm C:\ProgramData\conhost.exe family_xworm behavioral1/memory/1560-34-0x00000000001C0000-0x00000000001DA000-memory.dmp family_xworm behavioral1/memory/2716-40-0x0000000000CF0000-0x0000000000D0A000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2652 powershell.exe 2544 powershell.exe 2832 powershell.exe 1552 powershell.exe -
Drops startup file 2 IoCs
Processes:
XClient.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\conhost.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\conhost.lnk XClient.exe -
Executes dropped EXE 3 IoCs
Processes:
conhost.execonhost.execonhost.exepid process 1560 conhost.exe 1660 conhost.exe 2716 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
XClient.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\ProgramData\\conhost.exe" XClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeXClient.exepid process 2652 powershell.exe 2544 powershell.exe 2832 powershell.exe 1552 powershell.exe 2276 XClient.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
XClient.exepowershell.exepowershell.exepowershell.exepowershell.execonhost.execonhost.execonhost.exedescription pid process Token: SeDebugPrivilege 2276 XClient.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 1552 powershell.exe Token: SeDebugPrivilege 2276 XClient.exe Token: SeDebugPrivilege 1560 conhost.exe Token: SeDebugPrivilege 1660 conhost.exe Token: SeDebugPrivilege 2716 conhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
XClient.exepid process 2276 XClient.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
XClient.exetaskeng.exedescription pid process target process PID 2276 wrote to memory of 2652 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 2652 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 2652 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 2544 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 2544 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 2544 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 2832 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 2832 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 2832 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 1552 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 1552 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 1552 2276 XClient.exe powershell.exe PID 2276 wrote to memory of 112 2276 XClient.exe schtasks.exe PID 2276 wrote to memory of 112 2276 XClient.exe schtasks.exe PID 2276 wrote to memory of 112 2276 XClient.exe schtasks.exe PID 1604 wrote to memory of 1560 1604 taskeng.exe conhost.exe PID 1604 wrote to memory of 1560 1604 taskeng.exe conhost.exe PID 1604 wrote to memory of 1560 1604 taskeng.exe conhost.exe PID 1604 wrote to memory of 1660 1604 taskeng.exe conhost.exe PID 1604 wrote to memory of 1660 1604 taskeng.exe conhost.exe PID 1604 wrote to memory of 1660 1604 taskeng.exe conhost.exe PID 1604 wrote to memory of 2716 1604 taskeng.exe conhost.exe PID 1604 wrote to memory of 2716 1604 taskeng.exe conhost.exe PID 1604 wrote to memory of 2716 1604 taskeng.exe conhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\conhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'conhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "conhost" /tr "C:\ProgramData\conhost.exe"2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {A6DC4480-DCB7-44F8-9791-5B96176D6EF3} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\conhost.exeC:\ProgramData\conhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\conhost.exeC:\ProgramData\conhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\conhost.exeC:\ProgramData\conhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\conhost.exeFilesize
77KB
MD5ef4458792b0cb6ac36ec855d8fa22746
SHA10b1df777312b444dc0fecc83a2961d8184424f29
SHA256378d29703f868965fb7f302df6ba41c86d082457cf1d1ac4a3a03439667ddb8b
SHA51214eaaf133c1a9e863b644962ae48b9c1d46529d8919ef286ca07ee8cc142b28d0bb49683cf85110953f4ca6476415e0286421d2e931b5e259a6cc1b1e6a5ab65
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD556700d63e2ab9aa40b358bcdbb1fcd42
SHA152f229da816d01fb953bad11871d8eb737da09e0
SHA25614bd80d96afeb624dd6eba74d03a281ad0db7e45f979a9fce26993bd3845b2b7
SHA512299c92d8387ad1af3f4cb564ae5348e77b3e69d652369c5511e60dca9c3fd5256dc050da656857d1ee3bce3bf6f4e57abdb384431eb6b022ba97e3e2f0c37bd9
-
memory/1560-34-0x00000000001C0000-0x00000000001DA000-memory.dmpFilesize
104KB
-
memory/2276-2-0x000007FEF54F0000-0x000007FEF5EDC000-memory.dmpFilesize
9.9MB
-
memory/2276-0-0x000007FEF54F3000-0x000007FEF54F4000-memory.dmpFilesize
4KB
-
memory/2276-1-0x0000000000CE0000-0x0000000000CFA000-memory.dmpFilesize
104KB
-
memory/2276-35-0x000007FEF54F3000-0x000007FEF54F4000-memory.dmpFilesize
4KB
-
memory/2276-36-0x000007FEF54F0000-0x000007FEF5EDC000-memory.dmpFilesize
9.9MB
-
memory/2544-15-0x000000001B6B0000-0x000000001B992000-memory.dmpFilesize
2.9MB
-
memory/2544-16-0x0000000001DD0000-0x0000000001DD8000-memory.dmpFilesize
32KB
-
memory/2652-7-0x0000000002D10000-0x0000000002D90000-memory.dmpFilesize
512KB
-
memory/2652-8-0x000000001B6E0000-0x000000001B9C2000-memory.dmpFilesize
2.9MB
-
memory/2652-9-0x0000000002790000-0x0000000002798000-memory.dmpFilesize
32KB
-
memory/2716-40-0x0000000000CF0000-0x0000000000D0A000-memory.dmpFilesize
104KB