General
-
Target
WizClient.exe
-
Size
399KB
-
Sample
240707-evpb6atcpr
-
MD5
63725d4c11dd0ab8c2313e234ac130f1
-
SHA1
3824b51f49a4529ec87c0b0513874db1ddb32a3b
-
SHA256
2fcedcfbaeec9b017a9766d03393371c0945dcb3411fb1bcbd28b7ede135187e
-
SHA512
1dbae2f346f22b18d5bcfb96b8423c24fbbc847655a236331adbbf9008776596e38d6c8937b2ab3aadb323bedcf39bf6df030d5dbae5dd6fbf4a4356271d7328
-
SSDEEP
6144:2TV1taX9DA8QL6ZlNzCFQ38CrfhSw8wblKzsMZ4EgUJT90JWBIz:2TV1cX9DjQLKcIh3dlKAjEgUJT9fB
Static task
static1
Behavioral task
behavioral1
Sample
WizClient.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
WizClient.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
xworm
improve-dating.gl.at.ply.gg:14761
wiz.bounceme.net:6000
-
Install_directory
%ProgramData%
Targets
-
-
Target
WizClient.exe
-
Size
399KB
-
MD5
63725d4c11dd0ab8c2313e234ac130f1
-
SHA1
3824b51f49a4529ec87c0b0513874db1ddb32a3b
-
SHA256
2fcedcfbaeec9b017a9766d03393371c0945dcb3411fb1bcbd28b7ede135187e
-
SHA512
1dbae2f346f22b18d5bcfb96b8423c24fbbc847655a236331adbbf9008776596e38d6c8937b2ab3aadb323bedcf39bf6df030d5dbae5dd6fbf4a4356271d7328
-
SSDEEP
6144:2TV1taX9DA8QL6ZlNzCFQ38CrfhSw8wblKzsMZ4EgUJT90JWBIz:2TV1cX9DjQLKcIh3dlKAjEgUJT9fB
Score10/10-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1