Overview
overview
10Static
static
10XClient.exe
windows7-x64
10XClient.exe
windows10-1703-x64
10XClient.exe
windows10-2004-x64
10XClient.exe
windows11-21h2-x64
10XClient.exe
macos-10.15-amd64
1XClient.exe
macos-10.15-amd64
4XClient.exe
ubuntu-18.04-amd64
XClient.exe
debian-9-armhf
XClient.exe
debian-9-mips
XClient.exe
debian-9-mipsel
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-08-2024 21:00
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
XClient.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral4
Sample
XClient.exe
Resource
win11-20240730-en
Behavioral task
behavioral5
Sample
XClient.exe
Resource
macos-20240711.1-en
Behavioral task
behavioral6
Sample
XClient.exe
Resource
macos-20240711.1-en
Behavioral task
behavioral7
Sample
XClient.exe
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral8
Sample
XClient.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
XClient.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
XClient.exe
Resource
debian9-mipsel-20240729-en
General
-
Target
XClient.exe
-
Size
80KB
-
MD5
bfa950b37b6a4f8de71af861e677a8b4
-
SHA1
2ee40bfbf2964d92c82256e5924169295dfdd225
-
SHA256
07f94f8f6061ba95899914496edc5854aa810de56797d9004875276d60e21ade
-
SHA512
235b514fac01b24edaef3aeb4209676789b6ba9264a8798cb7ae48c26d2455cdd8f254e92bbba688535acb69fd77b3c0a0a549cf97ece84c235cc74f72234e1a
-
SSDEEP
1536:EI5NuEGJkEtydWqZQSp1eS+b59gxzhfxdl/5m6qeo//3Oy/4IK4Dax5:Eg1GhtktQGAS+b59cJ4eA/OlINDab
Malware Config
Extracted
xworm
full-self.gl.at.ply.gg:45212
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3288-0-0x0000000000F40000-0x0000000000F5A000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3244 powershell.exe 376 powershell.exe 700 powershell.exe 200 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 700 powershell.exe 700 powershell.exe 700 powershell.exe 200 powershell.exe 200 powershell.exe 200 powershell.exe 3244 powershell.exe 3244 powershell.exe 3244 powershell.exe 376 powershell.exe 376 powershell.exe 376 powershell.exe 3288 XClient.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3288 XClient.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeIncreaseQuotaPrivilege 700 powershell.exe Token: SeSecurityPrivilege 700 powershell.exe Token: SeTakeOwnershipPrivilege 700 powershell.exe Token: SeLoadDriverPrivilege 700 powershell.exe Token: SeSystemProfilePrivilege 700 powershell.exe Token: SeSystemtimePrivilege 700 powershell.exe Token: SeProfSingleProcessPrivilege 700 powershell.exe Token: SeIncBasePriorityPrivilege 700 powershell.exe Token: SeCreatePagefilePrivilege 700 powershell.exe Token: SeBackupPrivilege 700 powershell.exe Token: SeRestorePrivilege 700 powershell.exe Token: SeShutdownPrivilege 700 powershell.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeSystemEnvironmentPrivilege 700 powershell.exe Token: SeRemoteShutdownPrivilege 700 powershell.exe Token: SeUndockPrivilege 700 powershell.exe Token: SeManageVolumePrivilege 700 powershell.exe Token: 33 700 powershell.exe Token: 34 700 powershell.exe Token: 35 700 powershell.exe Token: 36 700 powershell.exe Token: SeDebugPrivilege 200 powershell.exe Token: SeIncreaseQuotaPrivilege 200 powershell.exe Token: SeSecurityPrivilege 200 powershell.exe Token: SeTakeOwnershipPrivilege 200 powershell.exe Token: SeLoadDriverPrivilege 200 powershell.exe Token: SeSystemProfilePrivilege 200 powershell.exe Token: SeSystemtimePrivilege 200 powershell.exe Token: SeProfSingleProcessPrivilege 200 powershell.exe Token: SeIncBasePriorityPrivilege 200 powershell.exe Token: SeCreatePagefilePrivilege 200 powershell.exe Token: SeBackupPrivilege 200 powershell.exe Token: SeRestorePrivilege 200 powershell.exe Token: SeShutdownPrivilege 200 powershell.exe Token: SeDebugPrivilege 200 powershell.exe Token: SeSystemEnvironmentPrivilege 200 powershell.exe Token: SeRemoteShutdownPrivilege 200 powershell.exe Token: SeUndockPrivilege 200 powershell.exe Token: SeManageVolumePrivilege 200 powershell.exe Token: 33 200 powershell.exe Token: 34 200 powershell.exe Token: 35 200 powershell.exe Token: 36 200 powershell.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeIncreaseQuotaPrivilege 3244 powershell.exe Token: SeSecurityPrivilege 3244 powershell.exe Token: SeTakeOwnershipPrivilege 3244 powershell.exe Token: SeLoadDriverPrivilege 3244 powershell.exe Token: SeSystemProfilePrivilege 3244 powershell.exe Token: SeSystemtimePrivilege 3244 powershell.exe Token: SeProfSingleProcessPrivilege 3244 powershell.exe Token: SeIncBasePriorityPrivilege 3244 powershell.exe Token: SeCreatePagefilePrivilege 3244 powershell.exe Token: SeBackupPrivilege 3244 powershell.exe Token: SeRestorePrivilege 3244 powershell.exe Token: SeShutdownPrivilege 3244 powershell.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeSystemEnvironmentPrivilege 3244 powershell.exe Token: SeRemoteShutdownPrivilege 3244 powershell.exe Token: SeUndockPrivilege 3244 powershell.exe Token: SeManageVolumePrivilege 3244 powershell.exe Token: 33 3244 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3288 XClient.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3288 wrote to memory of 700 3288 XClient.exe 74 PID 3288 wrote to memory of 700 3288 XClient.exe 74 PID 3288 wrote to memory of 200 3288 XClient.exe 77 PID 3288 wrote to memory of 200 3288 XClient.exe 77 PID 3288 wrote to memory of 3244 3288 XClient.exe 79 PID 3288 wrote to memory of 3244 3288 XClient.exe 79 PID 3288 wrote to memory of 376 3288 XClient.exe 81 PID 3288 wrote to memory of 376 3288 XClient.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD52e9dd95184cea977731903f90865d9ef
SHA19ecb89cef9506ed83a9724d49b378333209368fc
SHA2564ca225427114b0363e6db736efd5c1c95212262c2734a1e339aa1c1c7630def3
SHA512ba241d9a5f05bfc5f75513f9723548336b588376eaedb8a552f9dd25628d0d365b76ce0020eaaf9695ecfe376c976d5e4f4f42374431b22f28ed54902af48986
-
Filesize
1KB
MD592ad4c817e941a23e7a341723de73add
SHA17d0a1cbec514a212982fa24f4a53f018757d83a9
SHA256d3cc2fb1a6040a5b247e1b8f42e3a6dcdf77f885d7835ad0ea4a0e5a98d98db9
SHA5126e7715b8093434e8b07ad23527142851009b3a30d2e8c8d55e642a280eea3d3a95050436d3e3e3656c8e8a460871f5abc1ffc10837bd593fd6d9af92f3a4be12
-
Filesize
1KB
MD5b68364f7d675a42673c36b9213943cb1
SHA1a62993ff4f19bb3879db0a57ce7d6dd1c6746221
SHA2567a2931e4b168de60385ad79c234d4d7640fd25bd060e6606096f40d67fbeca26
SHA512618f6c8d299d1fec3c6a8cffee9b0776e4fcedb16c2ebc42553fc0aa8eb19806d8a7cd875a4174983eefee48b330d9693126c8b544a0b22573e5248a19f8d9fc
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a