Analysis

  • max time kernel
    48s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2024 14:06

General

  • Target

    XClient.exe

  • Size

    38KB

  • MD5

    bfbb29d4f8dc3ce3b7b67e055fb70bcf

  • SHA1

    f9a646e32fb5ec8eb10f1486e5a95883a902b108

  • SHA256

    dd90b5843c6550de3403c5bf221c3639e56083e337f49050cd21c625229d9609

  • SHA512

    e05e3db627c1a9d8de16f1357a95f330b71724dd8ae182a62ad0d3c55414d6ad0caa4ca28f0bb746173565cd1705aa82fa8d41cd99ddddbc43379a746f568a71

  • SSDEEP

    768:siS8brf7blu3ml5G7m9NFfZk7FWPB9WxOOMhTaQkrl:zpnf7c+5PFyFO9WxOOM5sl

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

instruments-survivor.gl.at.ply.gg:29973

Mutex

Bv3T1nydYnsmIsFU

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:840
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x570
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/840-0-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

    Filesize

    4KB

  • memory/840-1-0x0000000000E50000-0x0000000000E60000-memory.dmp

    Filesize

    64KB

  • memory/840-6-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/840-7-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

    Filesize

    4KB

  • memory/840-8-0x000000001AAA0000-0x000000001AAAC000-memory.dmp

    Filesize

    48KB

  • memory/840-9-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/840-10-0x000000001BE60000-0x000000001BEEE000-memory.dmp

    Filesize

    568KB