General
-
Target
XCliesnt.exe
-
Size
43KB
-
Sample
240715-3xlaaayalh
-
MD5
ef7bbfcdd3e9fb5e5ba7c567cfe7fc6c
-
SHA1
4621bfc54dbff13c60de87008087aa787aa940ce
-
SHA256
a9059e5dd9e4b54be722da461c46a83c92c8be0b15faf38396c1954b5fa96b39
-
SHA512
60ab3599c34fb5d95d203a4b20039de87a4560fa085d1073a0d10ee08cfd9d9d02c498ec61bce98288c804d95e938af54af00fa8c5fc2e3141214246e15a4fc6
-
SSDEEP
768:7X1qj4zpgLPg99okX2jhM6Lc+F+w9O5eoPR68O+hmbWLV7:7lq8zpgjgr5X2j3JFP9ieeR68O+0Wd
Behavioral task
behavioral1
Sample
XCliesnt.exe
Resource
win11-20240709-en
Malware Config
Extracted
xworm
5.0
86.160.77.154:7000
0x20Be82eDe1D3001d450d10ef6944eC28a0682F4f:1
DbHMnXSUFhmbwYrL
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XCliesnt.exe
-
Size
43KB
-
MD5
ef7bbfcdd3e9fb5e5ba7c567cfe7fc6c
-
SHA1
4621bfc54dbff13c60de87008087aa787aa940ce
-
SHA256
a9059e5dd9e4b54be722da461c46a83c92c8be0b15faf38396c1954b5fa96b39
-
SHA512
60ab3599c34fb5d95d203a4b20039de87a4560fa085d1073a0d10ee08cfd9d9d02c498ec61bce98288c804d95e938af54af00fa8c5fc2e3141214246e15a4fc6
-
SSDEEP
768:7X1qj4zpgLPg99okX2jhM6Lc+F+w9O5eoPR68O+hmbWLV7:7lq8zpgjgr5X2j3JFP9ieeR68O+0Wd
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1