Analysis
-
max time kernel
1046s -
max time network
1050s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2024, 20:35
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20241007-en
General
-
Target
XClient.exe
-
Size
64KB
-
MD5
f78aaa2ed14328c0566fb6ee84e9ca5d
-
SHA1
32fdcc0eb824f46f41e21d5bc1bf0d3ec8e57a71
-
SHA256
52dedc736371a5e6264336b06f8ed4ec60148eac2d4e53cb0184426e518fc0ef
-
SHA512
22cac650566fe36f24dcdbb92f4cdd3e75e1597bfa7c8f90b174974f4bcbfe7826be0ebdf5fd4cd6949b724e155604baf4681fdec9d800f2270220f689e01029
-
SSDEEP
1536:RtXfzM1SDy2ieLVzFuxb7+bYKU+QD716zufOYPDmZu5:77OWyGFuxb7+bY7nOYbX5
Malware Config
Extracted
xworm
guide-greatly.gl.at.ply.gg:16040
-
Install_directory
%LocalAppData%
-
install_file
SecurityHealthSystray.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/4644-1-0x00000000009E0000-0x00000000009F6000-memory.dmp family_xworm behavioral1/files/0x000b000000023c77-62.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4008 powershell.exe 4792 powershell.exe 3536 powershell.exe 2284 powershell.exe 3628 powershell.exe 3112 powershell.exe 3128 powershell.exe 1336 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SecurityHealthSystray.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk SecurityHealthSystray.exe -
Executes dropped EXE 8 IoCs
pid Process 3580 SecurityHealthSystray.exe 2116 SecurityHealthSystray.exe 3076 SecurityHealthSystray.exe 2412 SecurityHealthSystray.exe 428 SecurityHealthSystray.exe 2696 SecurityHealthSystray.exe 2112 SecurityHealthSystray.exe 1320 SecurityHealthSystray.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Users\\Admin\\AppData\\Local\\SecurityHealthSystray.exe" SecurityHealthSystray.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Users\\Admin\\AppData\\Local\\SecurityHealthSystray.exe" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1816 schtasks.exe 1692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2284 powershell.exe 2284 powershell.exe 3628 powershell.exe 3628 powershell.exe 3112 powershell.exe 3112 powershell.exe 3128 powershell.exe 3128 powershell.exe 4644 XClient.exe 1336 powershell.exe 1336 powershell.exe 4008 powershell.exe 4008 powershell.exe 4792 powershell.exe 4792 powershell.exe 3536 powershell.exe 3536 powershell.exe 1320 SecurityHealthSystray.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 4644 XClient.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 3112 powershell.exe Token: SeDebugPrivilege 3128 powershell.exe Token: SeDebugPrivilege 4644 XClient.exe Token: SeDebugPrivilege 3580 SecurityHealthSystray.exe Token: SeDebugPrivilege 2116 SecurityHealthSystray.exe Token: SeDebugPrivilege 3076 SecurityHealthSystray.exe Token: SeDebugPrivilege 2412 SecurityHealthSystray.exe Token: SeDebugPrivilege 428 SecurityHealthSystray.exe Token: SeDebugPrivilege 2696 SecurityHealthSystray.exe Token: SeDebugPrivilege 2112 SecurityHealthSystray.exe Token: SeDebugPrivilege 1320 SecurityHealthSystray.exe Token: SeDebugPrivilege 1336 powershell.exe Token: SeDebugPrivilege 4008 powershell.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeDebugPrivilege 3536 powershell.exe Token: SeDebugPrivilege 1320 SecurityHealthSystray.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4644 XClient.exe 1320 SecurityHealthSystray.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2284 4644 XClient.exe 85 PID 4644 wrote to memory of 2284 4644 XClient.exe 85 PID 4644 wrote to memory of 3628 4644 XClient.exe 87 PID 4644 wrote to memory of 3628 4644 XClient.exe 87 PID 4644 wrote to memory of 3112 4644 XClient.exe 89 PID 4644 wrote to memory of 3112 4644 XClient.exe 89 PID 4644 wrote to memory of 3128 4644 XClient.exe 91 PID 4644 wrote to memory of 3128 4644 XClient.exe 91 PID 4644 wrote to memory of 1816 4644 XClient.exe 93 PID 4644 wrote to memory of 1816 4644 XClient.exe 93 PID 1320 wrote to memory of 1336 1320 SecurityHealthSystray.exe 124 PID 1320 wrote to memory of 1336 1320 SecurityHealthSystray.exe 124 PID 1320 wrote to memory of 4008 1320 SecurityHealthSystray.exe 126 PID 1320 wrote to memory of 4008 1320 SecurityHealthSystray.exe 126 PID 1320 wrote to memory of 4792 1320 SecurityHealthSystray.exe 128 PID 1320 wrote to memory of 4792 1320 SecurityHealthSystray.exe 128 PID 1320 wrote to memory of 3536 1320 SecurityHealthSystray.exe 130 PID 1320 wrote to memory of 3536 1320 SecurityHealthSystray.exe 130 PID 1320 wrote to memory of 1692 1320 SecurityHealthSystray.exe 132 PID 1320 wrote to memory of 1692 1320 SecurityHealthSystray.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\SecurityHealthSystray.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Local\SecurityHealthSystray.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1816
-
-
C:\Users\Admin\AppData\Local\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\SecurityHealthSystray.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
C:\Users\Admin\AppData\Local\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\SecurityHealthSystray.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
C:\Users\Admin\AppData\Local\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\SecurityHealthSystray.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
C:\Users\Admin\AppData\Local\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\SecurityHealthSystray.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
C:\Users\Admin\AppData\Local\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\SecurityHealthSystray.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:428
-
C:\Users\Admin\AppData\Local\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\SecurityHealthSystray.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
C:\Users\Admin\AppData\Local\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\SecurityHealthSystray.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
C:\Users\Admin\AppData\Local\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\SecurityHealthSystray.exe1⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\SecurityHealthSystray.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\SecurityHealthSystray.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Local\SecurityHealthSystray.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD522f467133d6a167b781133de6925efdd
SHA100e48ecb19ae50d83db35c927d9c20e8050cd03e
SHA25616befccb34aab49b0f3433954db6f741b4204c67461ea663701632c743c68d90
SHA5127e8e05794aac484441f07967076ba669963483c1c71e14343dda11d6d164db44c74ad4760224be454b263be99137ddf23f637e3e69bfd870b54679e0bb9c17de
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD5993af531f0b57e8128ec273731c3a8e2
SHA1a42ea55876f4f390837dd2c95fb7ff2344b6e9e1
SHA256fff934d70d813381536d272c5b8ac6ad70acd054267b13592da767c9bd1dda62
SHA512bdf5970ff2ee314dc297fce5c0f44765e77acbf269cd9ad9e7448a391d5f80d66a0c5426f99bc3480851e8763413aa180b3b3b6b22ef0e86a365450cb8c334e4
-
Filesize
944B
MD528a4b014470142f34fdbbaf0bc8d9317
SHA1bf6487c7127d9e396b343dbd652c3d96902e4fc4
SHA256e3e552ac32773c5511eb60a159c709f475e8e066b9ffeef6d8f32df9899ef9b2
SHA51208b7d6fd067fe3eda7135b4fdf57972eebd7b6f0436036001fbc06a4874555367ea896c0d76908e78263795224ea89ba1adb65a2870a3527e377c8acac9664e6
-
Filesize
944B
MD5da5c82b0e070047f7377042d08093ff4
SHA189d05987cd60828cca516c5c40c18935c35e8bd3
SHA25677a94ef8c4258445d538a6006ffadb05afdf888f6f044e1e5466b981a07f16c5
SHA5127360311a3c97b73dd3f6d7179cd979e0e20d69f380d38292447e17e369087d9dd5acb66cd0cbdd95ac4bfb16e5a1b86825f835a8d45b14ea9812102cff59704b
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
64KB
MD5f78aaa2ed14328c0566fb6ee84e9ca5d
SHA132fdcc0eb824f46f41e21d5bc1bf0d3ec8e57a71
SHA25652dedc736371a5e6264336b06f8ed4ec60148eac2d4e53cb0184426e518fc0ef
SHA51222cac650566fe36f24dcdbb92f4cdd3e75e1597bfa7c8f90b174974f4bcbfe7826be0ebdf5fd4cd6949b724e155604baf4681fdec9d800f2270220f689e01029
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk
Filesize1KB
MD5a6e284717291b02e4da4f9361e2de85d
SHA1926284f697c0dbd7ead4cd20927a96e3891843db
SHA25656fb8056a9739ba32e7e8c53a4ddf4537e1a49621751eaf23ff644f355ce09c4
SHA512343cbfdcce1e988dcc204b0f8abf77980d1916e2e163754fd9cbb002004669666f352d6389d9f8b0bd6a2e9c43a4729fcaf0b15935e5e8e84c4f9ed7daa5c057