Analysis

  • max time kernel
    438s
  • max time network
    1165s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-11-2024 18:27

General

  • Target

    XClient.exe

  • Size

    72KB

  • MD5

    e84ea1a720b6e323cd719883a7bc9a59

  • SHA1

    7d9b1639bf6b4886dae466b7193189bc126d8296

  • SHA256

    fd7d13f4db3ee83d8adcd3a1de3d8cf7135563e889a5438882882cfb90983413

  • SHA512

    b92ab91a87f7359fdbee436695db74f1d00458ab9064fc7c737796bed199523a5bc0080ba653452287d2060f71f021cbaea951b0fdf40f6456994f3b5a81e6d0

  • SSDEEP

    1536:tFjrzrPUMFIKBi3Ov+JplibWt5mHkTR6Q6TtkrwVO9dhLO:jjrzZOKBiribWFTR6zkUVO9/O

Score
10/10

Malware Config

Extracted

Family

xworm

C2

147.185.221.23:9000

Attributes
  • Install_directory

    %AppData%

  • install_file

    SystemUser.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2352-0-0x00007FFE826F3000-0x00007FFE826F5000-memory.dmp

    Filesize

    8KB

  • memory/2352-1-0x0000000000060000-0x0000000000078000-memory.dmp

    Filesize

    96KB

  • memory/2352-2-0x00007FFE826F0000-0x00007FFE831B2000-memory.dmp

    Filesize

    10.8MB

  • memory/2352-3-0x00007FFE826F0000-0x00007FFE831B2000-memory.dmp

    Filesize

    10.8MB