Analysis
-
max time kernel
288s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 23:02
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240729-en
windows7-x64
8 signatures
300 seconds
General
-
Target
XClient.exe
-
Size
38KB
-
MD5
ae50a76a857b87ec226760a04008e520
-
SHA1
209202d2d9f1e844df41680fcdbb696f42bb6569
-
SHA256
d42d5474c1744aed95113691b98d149890d3ec920c8f19dcca2edc5fa6a85c99
-
SHA512
f7c5f95966d945496b1b65c29a8301f75917419879da2bfe1f389d800b903d559d2da93f4d4b5ffc7990e3b85f0bb30c8c61a7bf04c7ad22a1a4ebba62b36d83
-
SSDEEP
768:8zzEorBoNsGxE35G7nSthO/i7FWP59WthOMhTaQki:2AorBgxy5XqiFK9WthOM1v
Malware Config
Extracted
Family
xworm
Version
5.0
C2
147.185.221.23:35660
Mutex
u6ggE01EpUtTQVJC
Attributes
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2540-1-0x0000000000310000-0x0000000000320000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2540 XClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2540 XClient.exe Token: SeDebugPrivilege 2540 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2540 XClient.exe