Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 13:51
Behavioral task
behavioral1
Sample
knockdown.exe
Resource
win10v2004-20241007-en
10 signatures
150 seconds
General
-
Target
knockdown.exe
-
Size
38KB
-
MD5
9b571882a40ac5ff15a5b58dc428164e
-
SHA1
dbc149eeabd1aa7abd409a7ca20dd61009c99b01
-
SHA256
a198b0780c41e0ebac9a8873eebcf790c547477f7dafa31d0252b0fe9fa33747
-
SHA512
bb1b7027c5a33607d806ff872d68798e9acdbfb733b5d8c8784c4720c94e028fbadf183f7f5e3600e211d723e8b642897c3bfb64eed3ab7f09e133d364a6b686
-
SSDEEP
768:98ZRI2y2Jjnfc5NiJZoB7FWPA9pJDOMh/jP:98Zdyajxi9FR9plOMtb
Score
10/10
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:7000
Mutex
OT8rL3nGHhHEZTlT
Attributes
-
Install_directory
%AppData%
-
install_file
XClient.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3808-1-0x0000000000BF0000-0x0000000000C00000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk knockdown.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk knockdown.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" knockdown.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe 3808 knockdown.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3808 knockdown.exe Token: SeDebugPrivilege 3808 knockdown.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4904 winver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3808 knockdown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\knockdown.exe"C:\Users\Admin\AppData\Local\Temp\knockdown.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3808
-
C:\Windows\System32\winver.exe"C:\Windows\System32\winver.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:4904