General
-
Target
62b96f7ff4146f33146f2c134e2bfe2ad3bc2df63f1276c9eb6ad1af5952940e.doc
-
Size
797KB
-
Sample
241107-c1j9aatfnp
-
MD5
917e800806d60717238c5b767070af1a
-
SHA1
2fd273a4f5a39691e4f256eebf4c0ec705a0d298
-
SHA256
62b96f7ff4146f33146f2c134e2bfe2ad3bc2df63f1276c9eb6ad1af5952940e
-
SHA512
ebc6c8f811383faad6f159b65e3db598173e5fba6fb6e0167dbdf85e148ddbcd25400e8c1395e7388ea897ae7cb646832c88400a7eb461bb65efd7d098d4afc4
-
SSDEEP
24576:/KOGjn4lUrN4vaxrB1qep1wuJ7NYtQV7dJXWlLPx:3q4m4Sxrzp1TJ7j7vXW
Behavioral task
behavioral1
Sample
62b96f7ff4146f33146f2c134e2bfe2ad3bc2df63f1276c9eb6ad1af5952940e.doc
Resource
win7-20240903-en
Malware Config
Extracted
xworm
185.244.29.113:5563
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
62b96f7ff4146f33146f2c134e2bfe2ad3bc2df63f1276c9eb6ad1af5952940e.doc
-
Size
797KB
-
MD5
917e800806d60717238c5b767070af1a
-
SHA1
2fd273a4f5a39691e4f256eebf4c0ec705a0d298
-
SHA256
62b96f7ff4146f33146f2c134e2bfe2ad3bc2df63f1276c9eb6ad1af5952940e
-
SHA512
ebc6c8f811383faad6f159b65e3db598173e5fba6fb6e0167dbdf85e148ddbcd25400e8c1395e7388ea897ae7cb646832c88400a7eb461bb65efd7d098d4afc4
-
SSDEEP
24576:/KOGjn4lUrN4vaxrB1qep1wuJ7NYtQV7dJXWlLPx:3q4m4Sxrzp1TJ7j7vXW
-
Detect Xworm Payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1