Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 18:08

Errors

Reason
Machine shutdown

General

  • Target

    XClient.exe

  • Size

    57KB

  • MD5

    27bb905c590e1ca57930019d3587801b

  • SHA1

    952e5b9a51b4e14d5b05bd8c79bc856cfd1798e8

  • SHA256

    1deef2c92f4d52e4f52164a6e3709543a155327a7ef4d51fe008a7f058e578ca

  • SHA512

    91393c6cbcf9385e6130d1f82c2a8aabcd6ff7292081f1ee63c0b237fbafecd284799c705efe48724bb6965971a2a38e99fab89711b9ed69968fed233f7f8e56

  • SSDEEP

    768:1L6touM9WQVzWfVsWUnPDpbongkbPPY89Wa94ogh5bjh/EgnOh/hA/F8Etr:FGKifK/PFzkbPPYGP94oYhDOBi/Xr

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:56069

front-applications.gl.at.ply.gg:56069

Attributes
  • install_file

    USB.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SYSTEM32\CMD.EXE
      "CMD.EXE"
      2⤵
        PID:3692

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2120-0-0x00007FFCCF6B3000-0x00007FFCCF6B5000-memory.dmp

      Filesize

      8KB

    • memory/2120-1-0x0000000000B40000-0x0000000000B54000-memory.dmp

      Filesize

      80KB

    • memory/2120-2-0x00007FFCCF6B0000-0x00007FFCD0171000-memory.dmp

      Filesize

      10.8MB

    • memory/2120-3-0x00007FFCCF6B3000-0x00007FFCCF6B5000-memory.dmp

      Filesize

      8KB

    • memory/2120-4-0x00007FFCCF6B0000-0x00007FFCD0171000-memory.dmp

      Filesize

      10.8MB

    • memory/2120-5-0x0000000002F10000-0x0000000002F1C000-memory.dmp

      Filesize

      48KB

    • memory/2120-6-0x000000001CCD0000-0x000000001D020000-memory.dmp

      Filesize

      3.3MB

    • memory/2120-7-0x0000000002CE0000-0x0000000002CEA000-memory.dmp

      Filesize

      40KB

    • memory/2120-8-0x0000000002F40000-0x0000000002F4A000-memory.dmp

      Filesize

      40KB

    • memory/2120-9-0x000000001CAD0000-0x000000001CADE000-memory.dmp

      Filesize

      56KB