Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 13:35

General

  • Target

    XClient.exe

  • Size

    337KB

  • MD5

    162b26363ec3fdacd60c3fd773dc8a73

  • SHA1

    145e6b6602b071a57c1466ad317356e8e3650939

  • SHA256

    42904fa667be59205858aadd515e7440a1fb89ace28eb8e76cd49125d768aef7

  • SHA512

    ab9a310ec0e63bd85c156315cd48fc8c198289d86a86744270adaa454b28da42baab33d310dc3d3e9dababc1cf9061e5d6e0df016a3ce7e6bf63e0b030fb1132

  • SSDEEP

    3072:fv3nO0vbHWKb0QBbb/4z7I3iOjhFz1Z2c40:fdWKbbAv81Z

Malware Config

Extracted

Family

xworm

C2

147.185.221.21:55421

advertise-msn.gl.at.ply.gg:55421

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    ohiotown.exe

Signatures

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1956
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3004
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\ohiotown.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1628
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ohiotown.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2220
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ohiotown" /tr "C:\ProgramData\ohiotown.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:308
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1912
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {A7B5539F-E47B-4337-867A-F43F1BDD6425} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\ProgramData\ohiotown.exe
      C:\ProgramData\ohiotown.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2324
    • C:\ProgramData\ohiotown.exe
      C:\ProgramData\ohiotown.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ohiotown.exe

    Filesize

    337KB

    MD5

    162b26363ec3fdacd60c3fd773dc8a73

    SHA1

    145e6b6602b071a57c1466ad317356e8e3650939

    SHA256

    42904fa667be59205858aadd515e7440a1fb89ace28eb8e76cd49125d768aef7

    SHA512

    ab9a310ec0e63bd85c156315cd48fc8c198289d86a86744270adaa454b28da42baab33d310dc3d3e9dababc1cf9061e5d6e0df016a3ce7e6bf63e0b030fb1132

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    d87aa1861205f31ed281f9732dacd2c7

    SHA1

    1b7317b1c37cb70ccfe94755b871d870bd691bf2

    SHA256

    42605ff973ad34bc75398d908633aa7dc577520fc8518ea5bee541a5052344ab

    SHA512

    8f0df2c2e3f980aa8bd039202e81521940ad249b0b2d51b62df259b3f213c156e66f687ee669035c38a1be7befb62a5f81b739bea944a72a1ebc4328ef040c8b

  • memory/1912-41-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/1912-40-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/1912-35-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/1912-34-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/1956-8-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

    Filesize

    2.9MB

  • memory/1956-9-0x00000000022E0000-0x00000000022E8000-memory.dmp

    Filesize

    32KB

  • memory/1956-7-0x0000000002E80000-0x0000000002F00000-memory.dmp

    Filesize

    512KB

  • memory/2324-39-0x0000000001290000-0x00000000012EA000-memory.dmp

    Filesize

    360KB

  • memory/2792-32-0x000007FEF5D43000-0x000007FEF5D44000-memory.dmp

    Filesize

    4KB

  • memory/2792-33-0x000007FEF5D40000-0x000007FEF672C000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-0-0x000007FEF5D43000-0x000007FEF5D44000-memory.dmp

    Filesize

    4KB

  • memory/2792-2-0x000007FEF5D40000-0x000007FEF672C000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-1-0x0000000000080000-0x00000000000DA000-memory.dmp

    Filesize

    360KB

  • memory/3004-16-0x0000000001ED0000-0x0000000001ED8000-memory.dmp

    Filesize

    32KB

  • memory/3004-15-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

    Filesize

    2.9MB