Analysis

  • max time kernel
    98s
  • max time network
    141s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    05-11-2024 04:51

General

  • Target

    XClient.exe

  • Size

    41KB

  • MD5

    68cd3a435fe428423ae7f95a91064d64

  • SHA1

    cd01633eaea2a7b6096b0e57f28d9d9c73081868

  • SHA256

    788826c70ec91ff43489ca7e461743a6915bddf22815f2c29527b0063617250e

  • SHA512

    1baded1773ee89ff3bd972f264643b5a1398dcfec1c386f4922122528f5cdebeabd5f1a5368b3d00b2ff67acb3e222ea67cace1c585c5ebf5b975a7a11544606

  • SSDEEP

    768:oThUnatAzAaI5ka0Z4UBUbsa+rg5FFPc9c7dOphwXm4El:oTWqAMn8BrRrcFk9cJOpT4El

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

108.228.0.61:7000

Mutex

DmqRIswTp1LSfaeU

Attributes
  • Install_directory

    %AppData%

  • install_file

    mw.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:32

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/32-0-0x00007FFA10493000-0x00007FFA10495000-memory.dmp

    Filesize

    8KB

  • memory/32-1-0x0000000000080000-0x0000000000090000-memory.dmp

    Filesize

    64KB

  • memory/32-2-0x00007FFA10490000-0x00007FFA10F52000-memory.dmp

    Filesize

    10.8MB

  • memory/32-3-0x00007FFA10490000-0x00007FFA10F52000-memory.dmp

    Filesize

    10.8MB