Analysis

  • max time kernel
    29s
  • max time network
    23s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17-11-2024 13:50

General

  • Target

    P00LCUE.exe

  • Size

    337KB

  • MD5

    a8bf7d1f42ce4fe13c76e01befe367fa

  • SHA1

    add32173cf45061d651b75f8b7ab33f86fdfbee7

  • SHA256

    310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8

  • SHA512

    eba707226d114c4405b25b627ee38ba5b2c24cf353fdafd1d78dd90c0fed5de67a2c8c0846609ad7d554306191836667f00dd896d12215fd769c6f36f0f58e2d

  • SSDEEP

    3072:rXjgxzi3Z80WaXjTa4X+oFM3bUiS75l/NTugUJV21KFpwqEBOrNoq98wSpvbUP:rzgxAZ82a4XrFXSlQqrR98XU

Malware Config

Extracted

Family

xworm

C2

185.84.161.66:5000

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
    "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3876
    • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
      "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
        "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4964
        • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
          "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1708
          • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
            "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
            5⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
              "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
              6⤵
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:4684
              • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
                "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
                7⤵
                • Checks computer location settings
                • Suspicious use of WriteProcessMemory
                PID:572
                • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
                  "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
                  8⤵
                  • Checks computer location settings
                  • Suspicious use of WriteProcessMemory
                  PID:2020
                  • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
                    "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
                    9⤵
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:2888
                    • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
                      "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
                      10⤵
                      • Checks computer location settings
                      • Suspicious use of WriteProcessMemory
                      PID:1632
                      • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
                        "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
                        11⤵
                        • Checks computer location settings
                        • Suspicious use of WriteProcessMemory
                        PID:1336
                        • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
                          "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
                          12⤵
                          • Checks computer location settings
                          • Suspicious use of WriteProcessMemory
                          PID:3576
                          • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
                            "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
                            13⤵
                              PID:3760
                              • C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe
                                "C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"
                                14⤵
                                  PID:1984
                                • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                                  "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                                  14⤵
                                    PID:3384
                                • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                                  "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                                  13⤵
                                  • Executes dropped EXE
                                  PID:4532
                              • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                                "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                                12⤵
                                • Executes dropped EXE
                                PID:2472
                            • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                              "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                              11⤵
                              • Executes dropped EXE
                              PID:4120
                          • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                            "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                            10⤵
                            • Executes dropped EXE
                            PID:3328
                        • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                          "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                          9⤵
                          • Executes dropped EXE
                          PID:3056
                      • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                        "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                        8⤵
                        • Executes dropped EXE
                        PID:2948
                    • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                      "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                      7⤵
                      • Executes dropped EXE
                      PID:3828
                  • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                    "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:1556
                • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                  "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:1192
              • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
                "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:3308
            • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
              "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:764
          • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe
            "C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"
            2⤵
            • Checks computer location settings
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2316
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe'
              3⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3496
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BLACKSUPER X.exe'
              3⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1596
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
              3⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:876
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
              3⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:4768
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:3324

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\P00LCUE.exe.log

          Filesize

          654B

          MD5

          11c6e74f0561678d2cf7fc075a6cc00c

          SHA1

          535ee79ba978554abcb98c566235805e7ea18490

          SHA256

          d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

          SHA512

          32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          3eb3833f769dd890afc295b977eab4b4

          SHA1

          e857649b037939602c72ad003e5d3698695f436f

          SHA256

          c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

          SHA512

          c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          c67441dfa09f61bca500bb43407c56b8

          SHA1

          5a56cf7cbeb48c109e2128c31b681fac3959157b

          SHA256

          63082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33

          SHA512

          325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          d4912bec47b4816428fa128df4fa0a53

          SHA1

          fe7dce5a760d1ef173ad7626f07f472038b749e1

          SHA256

          0d6f82afd823640b18f090cf73647c40642c96597b4c7996b18e63fee28ec29d

          SHA512

          0b1311794817912bfd296898e083a9e4797b3d0f8a480617c78e9e36c76ae5b44c9e94972fe5a3e8fea125eacdfcc0c233b13e931ad62a9ba3f65db7f27129a6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          3726ddfd0b78d84ff1238805dd057c46

          SHA1

          d659e588d74ebceae1d1314094bf4a2b5e503ca4

          SHA256

          bebe6c87c970f73beb977e6d93a2249b15e08a1ca01ae0f35a666a9030512cb5

          SHA512

          3ad071f31234f93549f79c6a7687cf560cfa0f51351fd8a17c0ec9eca14f4ee420c0afd4b2213bdeb4c20d620b7e7dd71ff59580150c35c002e638717bee12ed

        • C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe

          Filesize

          69KB

          MD5

          2d58b179ec133f1016a2496a96c5da20

          SHA1

          f5b59d6c3c382295d5d5fed1aed04342a7ab7f2e

          SHA256

          ea9c924bd79e33535b8d6537da0a320ce89d6700697173397bb0a31341831a1b

          SHA512

          486e8248f14d721519bd3701d8dfaf6b8e5af2bce02825fac078402c5ac4a1ceff72af2c36eb3a5c3006aaef0eb00ae8b2289d5a2b8b149e50e7bc7e2bad5abc

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r2wom4zv.zpc.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/2316-20-0x0000000000970000-0x0000000000988000-memory.dmp

          Filesize

          96KB

        • memory/2316-22-0x00007FFBC1A10000-0x00007FFBC24D2000-memory.dmp

          Filesize

          10.8MB

        • memory/2316-77-0x00007FFBC1A10000-0x00007FFBC24D2000-memory.dmp

          Filesize

          10.8MB

        • memory/2316-85-0x00007FFBC1A10000-0x00007FFBC24D2000-memory.dmp

          Filesize

          10.8MB

        • memory/2316-26-0x00007FFBC1A10000-0x00007FFBC24D2000-memory.dmp

          Filesize

          10.8MB

        • memory/3496-36-0x00000222A7CF0000-0x00000222A7D12000-memory.dmp

          Filesize

          136KB

        • memory/3776-19-0x00007FFBC1A10000-0x00007FFBC24D2000-memory.dmp

          Filesize

          10.8MB

        • memory/3776-25-0x00007FFBC1A10000-0x00007FFBC24D2000-memory.dmp

          Filesize

          10.8MB

        • memory/3776-23-0x00007FFBC1A10000-0x00007FFBC24D2000-memory.dmp

          Filesize

          10.8MB

        • memory/3876-21-0x00007FFBC1A10000-0x00007FFBC24D2000-memory.dmp

          Filesize

          10.8MB

        • memory/3876-0-0x00007FFBC1A13000-0x00007FFBC1A15000-memory.dmp

          Filesize

          8KB

        • memory/3876-2-0x00007FFBC1A10000-0x00007FFBC24D2000-memory.dmp

          Filesize

          10.8MB

        • memory/3876-1-0x0000000000010000-0x000000000006A000-memory.dmp

          Filesize

          360KB