Resubmissions
07/08/2024, 17:58
240807-wkbfzs1fpq 1007/08/2024, 17:55
240807-whvf3svdma 1007/08/2024, 17:47
240807-wcy73svcrh 10Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 17:58
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240802-en
General
-
Target
XClient.exe
-
Size
53KB
-
MD5
5496793299d1c888dfd87a790447bc84
-
SHA1
fcff41d475c5415ea27ad63728054a07c2165c67
-
SHA256
a8832fdd998e86f7823e93f27a98ef6d7ac44537c709adcfdd9537a53a42d3c4
-
SHA512
b51e92e509c0ef8690c840a45aed9435c2cf21a8723e6023cffc05d1e9f9edac63a7f9a74bb676a89b840db66fa0f66fb6c2808a01fb68de108216b3fb124676
-
SSDEEP
768:M+QiIOyhxNxGEaRiYLKhSPx2oWbpBZ5msdAWLPHHO2IhX4+zb:bQi22EKKha2TbpBHA+O2I5b
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
hentai.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/1760-1-0x0000000000D60000-0x0000000000D74000-memory.dmp family_xworm behavioral1/files/0x00080000000120fe-8.dat family_xworm behavioral1/memory/2260-10-0x0000000000F50000-0x0000000000F64000-memory.dmp family_xworm behavioral1/memory/1688-94-0x0000000000300000-0x0000000000314000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hentai.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hentai.lnk XClient.exe -
Executes dropped EXE 3 IoCs
pid Process 2260 hentai.exe 2560 hentai.exe 1688 hentai.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\hentai = "C:\\Users\\Admin\\AppData\\Roaming\\hentai.exe" XClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05734651-54E7-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2920 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 972 POWERPNT.EXE 1932 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1932 vlc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1760 XClient.exe Token: SeDebugPrivilege 2260 hentai.exe Token: SeDebugPrivilege 2560 hentai.exe Token: 33 1932 vlc.exe Token: SeIncBasePriorityPrivilege 1932 vlc.exe Token: SeDebugPrivilege 1688 hentai.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe 1932 vlc.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 972 POWERPNT.EXE 1932 vlc.exe 1960 iexplore.exe 1960 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2920 1760 XClient.exe 31 PID 1760 wrote to memory of 2920 1760 XClient.exe 31 PID 1760 wrote to memory of 2920 1760 XClient.exe 31 PID 2748 wrote to memory of 2260 2748 taskeng.exe 36 PID 2748 wrote to memory of 2260 2748 taskeng.exe 36 PID 2748 wrote to memory of 2260 2748 taskeng.exe 36 PID 972 wrote to memory of 1660 972 POWERPNT.EXE 40 PID 972 wrote to memory of 1660 972 POWERPNT.EXE 40 PID 972 wrote to memory of 1660 972 POWERPNT.EXE 40 PID 972 wrote to memory of 1660 972 POWERPNT.EXE 40 PID 2748 wrote to memory of 2560 2748 taskeng.exe 41 PID 2748 wrote to memory of 2560 2748 taskeng.exe 41 PID 2748 wrote to memory of 2560 2748 taskeng.exe 41 PID 2748 wrote to memory of 1688 2748 taskeng.exe 46 PID 2748 wrote to memory of 1688 2748 taskeng.exe 46 PID 2748 wrote to memory of 1688 2748 taskeng.exe 46 PID 1960 wrote to memory of 3064 1960 iexplore.exe 48 PID 1960 wrote to memory of 3064 1960 iexplore.exe 48 PID 1960 wrote to memory of 3064 1960 iexplore.exe 48 PID 1960 wrote to memory of 3064 1960 iexplore.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hentai" /tr "C:\Users\Admin\AppData\Roaming\hentai.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2920
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2888
-
C:\Windows\system32\taskeng.exetaskeng.exe {958D0372-C5B6-4ACE-9A79-F1B0B1A337DB} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\hentai.exeC:\Users\Admin\AppData\Roaming\hentai.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Users\Admin\AppData\Roaming\hentai.exeC:\Users\Admin\AppData\Roaming\hentai.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Roaming\hentai.exeC:\Users\Admin\AppData\Roaming\hentai.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /s "C:\Users\Admin\Desktop\CloseStop.ppsm"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1660
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Public\Videos\Sample Videos\Wildlife.wmv"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1932
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8cb6950cd1992867a1876ecf510e57c
SHA144b144447471a6a3f606580f232b34b4e3f53e99
SHA2566d813b8570818cc60a276157ae7aea9bf35b13ef43237a5d1db567897d6f2fbe
SHA51295481ebe2e306f7059849eec10dc299f5e99c8c7f43596ee54cbc1732841b87e31b1c5c148fafb5a043de3414c75dd0626f93ca91eb20b7ac4fe2a4fffdfd15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56976e5a8747b80d354f1577928620e9a
SHA1a8845226d0bc218438eef71da39f161702640a0e
SHA256b648ac6d2bd8b731d8c65063cae687341fd5c1169b053a7dc8c5241cb1fb39f3
SHA512ddfcb840d93463dd27e5ce487d4b6dcb16f324fc8471b620551571b078a4a6d0906be8c468b6689ecc329d08fa7bb2a23b84f24cf9f5a3414d1e0c7c80f295c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a149bb1d26e7af955da01dff00b937e6
SHA1e420d80ac879498bc93acb7827b7085783ef94c3
SHA256eb43b0a099969eac34494f6a419750fe5f410e8b38d837736b2541ea53a169cc
SHA5121472b6d5b6c469c4bbe0afb91880877424643601bb2f4c63fafe2ae6d4045db76ac296e03bc2731e19332bd109d706b5bed17cea95100e1da3a7234baa627054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbea1fe2deed3a64279cd49fd623aa5
SHA13d92ef03da15471c27f7f4a280f37c4288d65667
SHA2567a0136627e738f194324fe0d1ceca68267363f9b6c322539e1ce0db54ecf19f5
SHA5126773eea6f8ceb42be5fd03b132ef30e1a946fe7af1454c6dc5b9d99a8a6dd419cb7872d51d7f59985ce0bcc0f4b2e7fe3bd5f1a7e8e563a808606f9cbf13c47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587648f946f03f1fb5b85c7568afccdb6
SHA1eabc3674f2e5d9c3c5e826dc1f87ccc86ac257e9
SHA256900de483df26c967df7f32119571c49d16863c9461057f21263d7a8b4e19ade5
SHA512c093bb781d3b3e067dd2b8cec82f72759bd87a4aa9d5b55a1023d604b28c6bf100faf0b5300c16b262a39097b7a7fe0306fa9f5368bf22d95ece4bdaa1dec653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db40e53b374d29e952db425c9a4fc302
SHA1af01ff6725de998d593f9381bd03e68099f1eb8d
SHA2563786a513a6d158afe48c34f836ebe0812ae1b3cf75d8351afcdc1e30d5915d0d
SHA5127b47cd95edd3c7de1ab4424f8f8e11cb79d883b81db370d0cb77de80d7fd92bb8eeb8f0608562ac64a0a0734530d286ebbd424ffd04402dd9948da8866b57058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7fa262ab5d88a4380246da84535fb9
SHA1f1144f01d3895077b7c20beb515ae50a1662c7ce
SHA25657ec8945ce12355d0978e117a4decd1a69384f1798026b0a7153be9097c9389a
SHA512dffd8f0da92765b4014f76e94043c1d74e462d3c86f07e41552747122efcbf37daf47b7400a306758cfce4525e9e74d31465329d2c1460aefff11ad2d82cb13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb770cb7137e82d0b59023397a53638
SHA12c563109a3a80f106c1cbe979ca7036643770f37
SHA25658a6acfbbbc8e1b8bbb04ab4bcbe75720617873972d3f0d1df8d4dba1a2e0c83
SHA5120aa54cc4164c360961a2608afe41494c82d6732d567438eecb32f70534c92bd810f0bae05fbc6a5b46c7b4f3ee97085cdf02ac20316c8e576d171ba9bbe349e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae0f71de6a941008b4ea96034ae079c0
SHA1858ceb40a6e7e2f3ef8318108eabb8b84a2d9933
SHA256422339c2146c299344a3230e9ba5bcc9b988e88c9c1b6ecacfeec44be8418639
SHA51288c0c2e04c1d89d6f84290fe3710c3852d82d67d57676caf4cc58d954cdbac85187f35f19c04abec3a8bf023148e98599d682e7c3c9ae75f5e808602c5d2fe5b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
53KB
MD55496793299d1c888dfd87a790447bc84
SHA1fcff41d475c5415ea27ad63728054a07c2165c67
SHA256a8832fdd998e86f7823e93f27a98ef6d7ac44537c709adcfdd9537a53a42d3c4
SHA512b51e92e509c0ef8690c840a45aed9435c2cf21a8723e6023cffc05d1e9f9edac63a7f9a74bb676a89b840db66fa0f66fb6c2808a01fb68de108216b3fb124676