Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2024 04:51

General

  • Target

    XClient.exe

  • Size

    41KB

  • MD5

    68cd3a435fe428423ae7f95a91064d64

  • SHA1

    cd01633eaea2a7b6096b0e57f28d9d9c73081868

  • SHA256

    788826c70ec91ff43489ca7e461743a6915bddf22815f2c29527b0063617250e

  • SHA512

    1baded1773ee89ff3bd972f264643b5a1398dcfec1c386f4922122528f5cdebeabd5f1a5368b3d00b2ff67acb3e222ea67cace1c585c5ebf5b975a7a11544606

  • SSDEEP

    768:oThUnatAzAaI5ka0Z4UBUbsa+rg5FFPc9c7dOphwXm4El:oTWqAMn8BrRrcFk9cJOpT4El

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

108.228.0.61:7000

Mutex

DmqRIswTp1LSfaeU

Attributes
  • Install_directory

    %AppData%

  • install_file

    mw.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:768

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/768-0-0x000007FEF5DA3000-0x000007FEF5DA4000-memory.dmp

    Filesize

    4KB

  • memory/768-1-0x00000000003B0000-0x00000000003C0000-memory.dmp

    Filesize

    64KB

  • memory/768-2-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

    Filesize

    9.9MB

  • memory/768-3-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

    Filesize

    9.9MB