Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
Resource
win10v2004-20241007-en
General
-
Target
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
-
Size
337KB
-
MD5
a8bf7d1f42ce4fe13c76e01befe367fa
-
SHA1
add32173cf45061d651b75f8b7ab33f86fdfbee7
-
SHA256
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8
-
SHA512
eba707226d114c4405b25b627ee38ba5b2c24cf353fdafd1d78dd90c0fed5de67a2c8c0846609ad7d554306191836667f00dd896d12215fd769c6f36f0f58e2d
-
SSDEEP
3072:rXjgxzi3Z80WaXjTa4X+oFM3bUiS75l/NTugUJV21KFpwqEBOrNoq98wSpvbUP:rzgxAZ82a4XrFXSlQqrR98XU
Malware Config
Extracted
xworm
185.84.161.66:5000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2688-13-0x0000000000BF0000-0x0000000000C08000-memory.dmp family_xworm behavioral1/files/0x00290000000150a7-12.dat family_xworm behavioral1/memory/1144-49-0x0000000000B00000-0x0000000000B18000-memory.dmp family_xworm behavioral1/memory/2268-52-0x0000000000D30000-0x0000000000D48000-memory.dmp family_xworm behavioral1/memory/2468-54-0x00000000011A0000-0x00000000011B8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 392 powershell.exe 1832 powershell.exe 2464 powershell.exe 2016 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk BLACKSUPER X.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk BLACKSUPER X.exe -
Executes dropped EXE 6 IoCs
pid Process 2652 P00LCUE.exe 2688 BLACKSUPER X.exe 1196 Process not Found 1144 XClient.exe 2268 XClient.exe 2468 XClient.exe -
Loads dropped DLL 2 IoCs
pid Process 3028 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 3056 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" BLACKSUPER X.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe 2652 P00LCUE.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2688 BLACKSUPER X.exe Token: SeDebugPrivilege 392 powershell.exe Token: SeDebugPrivilege 1832 powershell.exe Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 2016 powershell.exe Token: SeDebugPrivilege 2688 BLACKSUPER X.exe Token: SeDebugPrivilege 1144 XClient.exe Token: SeDebugPrivilege 2268 XClient.exe Token: SeDebugPrivilege 2468 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 BLACKSUPER X.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2652 3028 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 30 PID 3028 wrote to memory of 2652 3028 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 30 PID 3028 wrote to memory of 2652 3028 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 30 PID 3028 wrote to memory of 2688 3028 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 32 PID 3028 wrote to memory of 2688 3028 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 32 PID 3028 wrote to memory of 2688 3028 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 32 PID 2652 wrote to memory of 2700 2652 P00LCUE.exe 33 PID 2652 wrote to memory of 2700 2652 P00LCUE.exe 33 PID 2652 wrote to memory of 2700 2652 P00LCUE.exe 33 PID 2652 wrote to memory of 2832 2652 P00LCUE.exe 34 PID 2652 wrote to memory of 2832 2652 P00LCUE.exe 34 PID 2652 wrote to memory of 2832 2652 P00LCUE.exe 34 PID 2688 wrote to memory of 392 2688 BLACKSUPER X.exe 36 PID 2688 wrote to memory of 392 2688 BLACKSUPER X.exe 36 PID 2688 wrote to memory of 392 2688 BLACKSUPER X.exe 36 PID 2688 wrote to memory of 1832 2688 BLACKSUPER X.exe 38 PID 2688 wrote to memory of 1832 2688 BLACKSUPER X.exe 38 PID 2688 wrote to memory of 1832 2688 BLACKSUPER X.exe 38 PID 2688 wrote to memory of 2464 2688 BLACKSUPER X.exe 40 PID 2688 wrote to memory of 2464 2688 BLACKSUPER X.exe 40 PID 2688 wrote to memory of 2464 2688 BLACKSUPER X.exe 40 PID 2688 wrote to memory of 2016 2688 BLACKSUPER X.exe 42 PID 2688 wrote to memory of 2016 2688 BLACKSUPER X.exe 42 PID 2688 wrote to memory of 2016 2688 BLACKSUPER X.exe 42 PID 2688 wrote to memory of 1924 2688 BLACKSUPER X.exe 44 PID 2688 wrote to memory of 1924 2688 BLACKSUPER X.exe 44 PID 2688 wrote to memory of 1924 2688 BLACKSUPER X.exe 44 PID 1804 wrote to memory of 1144 1804 taskeng.exe 47 PID 1804 wrote to memory of 1144 1804 taskeng.exe 47 PID 1804 wrote to memory of 1144 1804 taskeng.exe 47 PID 1804 wrote to memory of 2268 1804 taskeng.exe 49 PID 1804 wrote to memory of 2268 1804 taskeng.exe 49 PID 1804 wrote to memory of 2268 1804 taskeng.exe 49 PID 1804 wrote to memory of 2468 1804 taskeng.exe 50 PID 1804 wrote to memory of 2468 1804 taskeng.exe 50 PID 1804 wrote to memory of 2468 1804 taskeng.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe"C:\Users\Admin\AppData\Local\Temp\310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BLACKSUPER X.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1924
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {73DC36A5-0B89-4DC2-B857-96F32422F527} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD52d58b179ec133f1016a2496a96c5da20
SHA1f5b59d6c3c382295d5d5fed1aed04342a7ab7f2e
SHA256ea9c924bd79e33535b8d6537da0a320ce89d6700697173397bb0a31341831a1b
SHA512486e8248f14d721519bd3701d8dfaf6b8e5af2bce02825fac078402c5ac4a1ceff72af2c36eb3a5c3006aaef0eb00ae8b2289d5a2b8b149e50e7bc7e2bad5abc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD55185c5407b2c397d3cbddf8f1e5e40a1
SHA1850e110202d837201b3edbfd6b27de1c73bdbd5b
SHA2563cf4f898533eb2e160c8ffd83f311227e6b0a8f110ae9efb439f1f14cd46457a
SHA51230fadd82472f87c4b0a280210ce2c08d58829ef4e8e6c604fb9bd9bbdcdca84c977ff90b57481f3eda43cd721359d2c6b0dd790605c2da35f757e192cba048d0
-
Filesize
49KB
MD582389acf1b04e8442fdafa7c49c29a97
SHA1573bbc1861498616a8fe79762de0fe3441e0ab21
SHA25670ef677a281065331f49877743d7674891ccb1e63023fbc17e4d6c2e9f28b27a
SHA5124d87d48265510da16fd22920bbbc4476278e1991b62584c320b020d53dcd7ca9b718d9f10750f63b25df1a741ef10369da013e880a3d979ef3faff9332fd3eb1