Analysis
-
max time kernel
3s -
max time network
145s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20-11-2024 19:28
Behavioral task
behavioral1
Sample
extfix.exe
Resource
win10v2004-20241007-en
General
-
Target
extfix.exe
-
Size
75KB
-
MD5
03ac7cea640de499ffd4d820cbf91aec
-
SHA1
c5431178ad49172a65398770a03fecccc37f711f
-
SHA256
c6ac39bb6bd04c72e7c1f23b6d98b7a3ae591efa9ef285458b27bef353a255cb
-
SHA512
52186a0938de15b83873626f72f594219dc193b1d5b7fbec5d2577761488f3379d5cd42e6de205964f6dec5cdfc3023de36375da28a0146a5311ab0516f23d7c
-
SSDEEP
1536:2L1YZRemnhY0X1+Q3jaHPjbIbnFJ8v6sqKoO4o0iD8:22ZPhhzOHobnv6oOz0iA
Malware Config
Extracted
xworm
127.0.0.1:64112
FRERE-57054.portmap.host:64112
solutions-stunning.gl.at.ply.gg:64112:64112
solutions-stunning.gl.at.ply.gg:64112
-
Install_directory
%Public%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/2084-1-0x00000000009F0000-0x0000000000A0A000-memory.dmp family_xworm behavioral2/files/0x002c00000004506e-59.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3020 powershell.exe 1136 powershell.exe 2700 powershell.exe 1944 powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2552 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2084 extfix.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\extfix.exe"C:\Users\Admin\AppData\Local\Temp\extfix.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\extfix.exe'2⤵
- Command and Scripting Interpreter: PowerShell
PID:3020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'extfix.exe'2⤵
- Command and Scripting Interpreter: PowerShell
PID:1136
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
PID:1944
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Public\XClient.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2552
-
-
C:\Users\Public\XClient.exe"C:\Users\Public\XClient.exe"1⤵PID:3916
-
C:\Users\Public\XClient.exe"C:\Users\Public\XClient.exe"1⤵PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD511c6e74f0561678d2cf7fc075a6cc00c
SHA1535ee79ba978554abcb98c566235805e7ea18490
SHA256d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63
SHA51232c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5f0f59cccd39a3694e0e6dfd44d0fa76d
SHA1fccd7911d463041e1168431df8823e4c4ea387c1
SHA25670466c7f3a911368d653396fdd68f993322c69e1797b492ca00f8be34b7f3401
SHA5125c726e1e28cb9c0c3ab963fbfbf471c6033839f3e535a3811581fdaa4da17175e5a8a8be84a4fccd99b81e048058e51d230ff3836e3ec920057a1b1676110bee
-
Filesize
1KB
MD5584a3f6021663a38e89aabb43644af55
SHA135ec76ebd8ca9e18f8d0317767ee65b28563d300
SHA256e8bc879869f4c1fbd857b93903db09a757ddc5669dfe9a9e1fdc55ea7efa71aa
SHA512c6bd91f09d000153a202bf197a8b1f450197a83a0284669be5fa436cc4faffcfa6f45ddcdd75a46b787f2279960fc799d9beaa7daa95b078944d06531d59c379
-
Filesize
1KB
MD58c89931b773ec9523b9b0a2ed2b60f34
SHA105cb6535cb9f08fceef8303045cb60c4b40c450c
SHA256961ea04c7ae3827031f14eb64bc91e0e5795ebaf902df46852706673ebe5cc69
SHA512d8a110be11de255b3bd870d56860adae4a58911d791f3822bc395a9756f94201eae1fae9c55233aacc8c923a67ce66c5a6a895d13ee460ac11b0620758c588e8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
75KB
MD503ac7cea640de499ffd4d820cbf91aec
SHA1c5431178ad49172a65398770a03fecccc37f711f
SHA256c6ac39bb6bd04c72e7c1f23b6d98b7a3ae591efa9ef285458b27bef353a255cb
SHA51252186a0938de15b83873626f72f594219dc193b1d5b7fbec5d2577761488f3379d5cd42e6de205964f6dec5cdfc3023de36375da28a0146a5311ab0516f23d7c