General
-
Target
XClient.exe
-
Size
62KB
-
Sample
240804-fretzsxbkm
-
MD5
0ec8fc74616f174746cb50e46d08d73a
-
SHA1
082c2fee8f1f1404b5299083428cf7fd769076a5
-
SHA256
2b105bc9141fb923b548a761f733a0bbd5ba732d317c83287a2daf091fac9f7e
-
SHA512
d499b24adcca2401e966b03d3369506b7ff534117aff65cdb070ab6cc3dc11abc653fb511eae52c6dfa742eb75ea592695e2b62f3b26f53d839c945ba206e05d
-
SSDEEP
1536:rc7XNZ0lMLslvRXTFyPIBbP+Q+GGI6jyIO+tb:kQGslvR9bP+Q+GqyIO+tb
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
r-insert.gl.at.ply.gg:43251
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
XClient.exe
-
Size
62KB
-
MD5
0ec8fc74616f174746cb50e46d08d73a
-
SHA1
082c2fee8f1f1404b5299083428cf7fd769076a5
-
SHA256
2b105bc9141fb923b548a761f733a0bbd5ba732d317c83287a2daf091fac9f7e
-
SHA512
d499b24adcca2401e966b03d3369506b7ff534117aff65cdb070ab6cc3dc11abc653fb511eae52c6dfa742eb75ea592695e2b62f3b26f53d839c945ba206e05d
-
SSDEEP
1536:rc7XNZ0lMLslvRXTFyPIBbP+Q+GGI6jyIO+tb:kQGslvR9bP+Q+GqyIO+tb
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
5