Analysis

  • max time kernel
    3s
  • max time network
    145s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    20-11-2024 19:28

General

  • Target

    extfix.exe

  • Size

    75KB

  • MD5

    03ac7cea640de499ffd4d820cbf91aec

  • SHA1

    c5431178ad49172a65398770a03fecccc37f711f

  • SHA256

    c6ac39bb6bd04c72e7c1f23b6d98b7a3ae591efa9ef285458b27bef353a255cb

  • SHA512

    52186a0938de15b83873626f72f594219dc193b1d5b7fbec5d2577761488f3379d5cd42e6de205964f6dec5cdfc3023de36375da28a0146a5311ab0516f23d7c

  • SSDEEP

    1536:2L1YZRemnhY0X1+Q3jaHPjbIbnFJ8v6sqKoO4o0iD8:22ZPhhzOHobnv6oOz0iA

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:64112

FRERE-57054.portmap.host:64112

solutions-stunning.gl.at.ply.gg:64112:64112

solutions-stunning.gl.at.ply.gg:64112

Attributes
  • Install_directory

    %Public%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\extfix.exe
    "C:\Users\Admin\AppData\Local\Temp\extfix.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2084
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\extfix.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      PID:3020
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'extfix.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      PID:1136
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      PID:2700
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      PID:1944
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Public\XClient.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2552
  • C:\Users\Public\XClient.exe
    "C:\Users\Public\XClient.exe"
    1⤵
      PID:3916
    • C:\Users\Public\XClient.exe
      "C:\Users\Public\XClient.exe"
      1⤵
        PID:552

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log

        Filesize

        654B

        MD5

        11c6e74f0561678d2cf7fc075a6cc00c

        SHA1

        535ee79ba978554abcb98c566235805e7ea18490

        SHA256

        d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

        SHA512

        32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        3eb3833f769dd890afc295b977eab4b4

        SHA1

        e857649b037939602c72ad003e5d3698695f436f

        SHA256

        c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

        SHA512

        c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        f0f59cccd39a3694e0e6dfd44d0fa76d

        SHA1

        fccd7911d463041e1168431df8823e4c4ea387c1

        SHA256

        70466c7f3a911368d653396fdd68f993322c69e1797b492ca00f8be34b7f3401

        SHA512

        5c726e1e28cb9c0c3ab963fbfbf471c6033839f3e535a3811581fdaa4da17175e5a8a8be84a4fccd99b81e048058e51d230ff3836e3ec920057a1b1676110bee

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        584a3f6021663a38e89aabb43644af55

        SHA1

        35ec76ebd8ca9e18f8d0317767ee65b28563d300

        SHA256

        e8bc879869f4c1fbd857b93903db09a757ddc5669dfe9a9e1fdc55ea7efa71aa

        SHA512

        c6bd91f09d000153a202bf197a8b1f450197a83a0284669be5fa436cc4faffcfa6f45ddcdd75a46b787f2279960fc799d9beaa7daa95b078944d06531d59c379

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        8c89931b773ec9523b9b0a2ed2b60f34

        SHA1

        05cb6535cb9f08fceef8303045cb60c4b40c450c

        SHA256

        961ea04c7ae3827031f14eb64bc91e0e5795ebaf902df46852706673ebe5cc69

        SHA512

        d8a110be11de255b3bd870d56860adae4a58911d791f3822bc395a9756f94201eae1fae9c55233aacc8c923a67ce66c5a6a895d13ee460ac11b0620758c588e8

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kmcknamp.jyr.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Public\XClient.exe

        Filesize

        75KB

        MD5

        03ac7cea640de499ffd4d820cbf91aec

        SHA1

        c5431178ad49172a65398770a03fecccc37f711f

        SHA256

        c6ac39bb6bd04c72e7c1f23b6d98b7a3ae591efa9ef285458b27bef353a255cb

        SHA512

        52186a0938de15b83873626f72f594219dc193b1d5b7fbec5d2577761488f3379d5cd42e6de205964f6dec5cdfc3023de36375da28a0146a5311ab0516f23d7c

      • memory/2084-0-0x00007FFB39223000-0x00007FFB39225000-memory.dmp

        Filesize

        8KB

      • memory/2084-2-0x00007FFB39220000-0x00007FFB39CE2000-memory.dmp

        Filesize

        10.8MB

      • memory/2084-1-0x00000000009F0000-0x0000000000A0A000-memory.dmp

        Filesize

        104KB

      • memory/2084-57-0x00007FFB39220000-0x00007FFB39CE2000-memory.dmp

        Filesize

        10.8MB

      • memory/2084-56-0x00007FFB39223000-0x00007FFB39225000-memory.dmp

        Filesize

        8KB

      • memory/3020-12-0x00000187291F0000-0x0000018729212000-memory.dmp

        Filesize

        136KB

      • memory/3020-20-0x00007FFB39220000-0x00007FFB39CE2000-memory.dmp

        Filesize

        10.8MB

      • memory/3020-17-0x00007FFB39220000-0x00007FFB39CE2000-memory.dmp

        Filesize

        10.8MB

      • memory/3020-16-0x00007FFB39220000-0x00007FFB39CE2000-memory.dmp

        Filesize

        10.8MB

      • memory/3020-15-0x00007FFB39220000-0x00007FFB39CE2000-memory.dmp

        Filesize

        10.8MB

      • memory/3020-14-0x00007FFB39220000-0x00007FFB39CE2000-memory.dmp

        Filesize

        10.8MB

      • memory/3020-13-0x00007FFB39220000-0x00007FFB39CE2000-memory.dmp

        Filesize

        10.8MB