Analysis
-
max time kernel
1193s -
max time network
1201s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11-11-2024 22:57
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
8 signatures
1200 seconds
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
8 signatures
1200 seconds
General
-
Target
XClient.exe
-
Size
38KB
-
MD5
ae50a76a857b87ec226760a04008e520
-
SHA1
209202d2d9f1e844df41680fcdbb696f42bb6569
-
SHA256
d42d5474c1744aed95113691b98d149890d3ec920c8f19dcca2edc5fa6a85c99
-
SHA512
f7c5f95966d945496b1b65c29a8301f75917419879da2bfe1f389d800b903d559d2da93f4d4b5ffc7990e3b85f0bb30c8c61a7bf04c7ad22a1a4ebba62b36d83
-
SSDEEP
768:8zzEorBoNsGxE35G7nSthO/i7FWP59WthOMhTaQki:2AorBgxy5XqiFK9WthOM1v
Malware Config
Extracted
Family
xworm
Version
5.0
C2
147.185.221.23:35660
Mutex
u6ggE01EpUtTQVJC
Attributes
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/784-1-0x0000000000680000-0x0000000000690000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 784 XClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 784 XClient.exe Token: SeDebugPrivilege 784 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 784 XClient.exe