Analysis
-
max time kernel
52s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 03:03
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20241007-en
General
-
Target
XClient.exe
-
Size
39KB
-
MD5
bc66e4663ecc5fe2d5c1ffb6399e828a
-
SHA1
95ef4b4ebecde00da0a3c6630a3556fb19b46a1a
-
SHA256
7c2910c7548a6fd1fe7eeacb7c24105a7049b670f1de0f5dbbe718e1d3cd3c70
-
SHA512
1334e5d14e5f85a2dbead8b566e5e78748b857e25da313a544699d6d5fcbf400d70619c41f3e1d56cd57006002f8a4ba8c7a21002fd6412dae54470087cca0d9
-
SSDEEP
768:Lz6nA3MxG5g8y5AcksKyJjL77FWPa9X2OwhAaG8r:/6nUuf5A72Fv9X2Ow6T8r
Malware Config
Extracted
xworm
5.0
127.0.0.1:2068
6oJ1GSe3avoqc597
-
Install_directory
%AppData%
-
install_file
FileExplorer.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/4444-1-0x0000000000130000-0x0000000000140000-memory.dmp family_xworm behavioral2/files/0x000e000000023bd3-23.dat family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FileExplorer.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FileExplorer.lnk XClient.exe -
Executes dropped EXE 1 IoCs
pid Process 4384 FileExplorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FileExplorer = "C:\\Users\\Admin\\AppData\\Roaming\\FileExplorer.exe" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4444 XClient.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 4444 XClient.exe 4444 XClient.exe 4444 XClient.exe 4444 XClient.exe 4444 XClient.exe 4444 XClient.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4444 XClient.exe Token: SeDebugPrivilege 4444 XClient.exe Token: SeDebugPrivilege 5004 taskmgr.exe Token: SeSystemProfilePrivilege 5004 taskmgr.exe Token: SeCreateGlobalPrivilege 5004 taskmgr.exe Token: SeDebugPrivilege 4384 FileExplorer.exe Token: 33 5004 taskmgr.exe Token: SeIncBasePriorityPrivilege 5004 taskmgr.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe 5004 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4444 XClient.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4444 wrote to memory of 2360 4444 XClient.exe 92 PID 4444 wrote to memory of 2360 4444 XClient.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FileExplorer" /tr "C:\Users\Admin\AppData\Roaming\FileExplorer.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5004
-
C:\Users\Admin\AppData\Roaming\FileExplorer.exeC:\Users\Admin\AppData\Roaming\FileExplorer.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5bc66e4663ecc5fe2d5c1ffb6399e828a
SHA195ef4b4ebecde00da0a3c6630a3556fb19b46a1a
SHA2567c2910c7548a6fd1fe7eeacb7c24105a7049b670f1de0f5dbbe718e1d3cd3c70
SHA5121334e5d14e5f85a2dbead8b566e5e78748b857e25da313a544699d6d5fcbf400d70619c41f3e1d56cd57006002f8a4ba8c7a21002fd6412dae54470087cca0d9
-
Filesize
798B
MD5009a4bf3c47be86b98d3fb448eacdc94
SHA1e6ec8191bc8e81894c7236237b92ec583d40b9e9
SHA256b634246042d3c21796b65a90b7877635414e45b68c3c94aa3dca7fdc1054e9be
SHA512e514e12bbf9e2269adb8ecc3daf6b2032f00aab328666de9bfaa4594b2abdb6b818e4e5ec5a6cc548ee8aced745b4b60a8753a2a86e26e982fc05abc8de62452