Resubmissions

25/12/2024, 19:05

241225-xrzb3atjez 10

25/12/2024, 19:02

241225-xpzj2stlgm 10

Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2024, 19:02

General

  • Target

    https://www.mediafire.com/file/na2x8kiftzlsryv/XClient.zip/file

Malware Config

Extracted

Family

xworm

Version

5.0

C2

147.185.221.24:45691

Mutex

IrBmNQz2dAEtRA4q

Attributes
  • Install_directory

    %Public%

  • install_file

    XClient.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/file/na2x8kiftzlsryv/XClient.zip/file
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4396
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ff8b7e846f8,0x7ff8b7e84708,0x7ff8b7e84718
      2⤵
        PID:2500
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:2
        2⤵
          PID:1084
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4236
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8
          2⤵
            PID:4424
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
            2⤵
              PID:512
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
              2⤵
                PID:2448
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:1
                2⤵
                  PID:1404
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6212 /prefetch:8
                  2⤵
                    PID:1976
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6212 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2676
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:1
                    2⤵
                      PID:1616
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:1
                      2⤵
                        PID:672
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5636 /prefetch:8
                        2⤵
                          PID:884
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:1
                          2⤵
                            PID:4116
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2216,1713212922222046569,16475351494890557159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6600 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:864
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:3920
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1624
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:1828
                              • C:\Program Files\7-Zip\7zFM.exe
                                "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\XClient.zip"
                                1⤵
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:4500
                              • C:\Users\Admin\Desktop\XClient.exe
                                "C:\Users\Admin\Desktop\XClient.exe"
                                1⤵
                                • Checks computer location settings
                                • Drops startup file
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                PID:3856
                                • C:\Windows\System32\schtasks.exe
                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Public\XClient.exe"
                                  2⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:4864
                              • C:\Users\Admin\Downloads\XClient.exe
                                "C:\Users\Admin\Downloads\XClient.exe"
                                1⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:692
                              • C:\Users\Public\XClient.exe
                                C:\Users\Public\XClient.exe
                                1⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4156
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x484 0x2ec
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4544

                              Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log

                                      Filesize

                                      654B

                                      MD5

                                      2ff39f6c7249774be85fd60a8f9a245e

                                      SHA1

                                      684ff36b31aedc1e587c8496c02722c6698c1c4e

                                      SHA256

                                      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                      SHA512

                                      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      bffcefacce25cd03f3d5c9446ddb903d

                                      SHA1

                                      8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                      SHA256

                                      23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                      SHA512

                                      761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      d22073dea53e79d9b824f27ac5e9813e

                                      SHA1

                                      6d8a7281241248431a1571e6ddc55798b01fa961

                                      SHA256

                                      86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                      SHA512

                                      97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      744B

                                      MD5

                                      eb200edd8a3571535d61b2b96a91f311

                                      SHA1

                                      d6d0b372707c8669dfb3ec575b4a857209553aa2

                                      SHA256

                                      c07f725af677cde9dc2b6efec81f69104ca1352792bc99ce79e8e0a96a0ab6fc

                                      SHA512

                                      053732a661ce27a608240bb5bcfacfccd1bf062f3d8c9579ddf5f4a98751f9e4fb41dc540fbdd34ba3b31843a691432604fee9a9fbf9c4ab6d2784cbd6c2d684

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      4KB

                                      MD5

                                      b649b0b9a550ee68258c9ec0571df912

                                      SHA1

                                      cfcdbf1e5a410ef4bd4d1c60faebc6187655ee93

                                      SHA256

                                      be48426288358f20d1f60b411f73b21973782ae38f8b32b9fbe7cc00f3cb7c5b

                                      SHA512

                                      680a4b44944f9435843ece870fd07ebd27d42d3395c517ce2f8bcef56d6d0ca7a02905f39af7d265b5eaa1b800ce14bec0b2e43206922f29d1b47793930c16af

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      8KB

                                      MD5

                                      2189aa162c2ec6a196093f5ab3af492b

                                      SHA1

                                      7849d615284db7a09dba387c8e1f27590dc84fff

                                      SHA256

                                      209b5ce243cc049338ec1ef8dcff6ca653fdef9facb62281422e05c9737ab473

                                      SHA512

                                      1cd3335ae68e03d970c234acd82086650081c2e241cbf9e6298c00a7bb27da067cc20cfb25a35e62ca2f78f9d707f63abdffd68904af874dc12816cd3fe151de

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      7faf8ec6303c09005747c0c2eb8052b2

                                      SHA1

                                      0999ad42eb094e4733cbe6ce52a5dac3e18452ac

                                      SHA256

                                      58fa39598d9f6cc327558a0fd8f9964bb98069f9ab4a179515653772f9121524

                                      SHA512

                                      0ecd359eddeb1f28652133fab93cfe0cbdb4dc23fe7c2e33296cbb010167d752e51ac23d64f834bb47accf3f76712a3a4c22eab813d4ecce8156c9a95a032448

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      7KB

                                      MD5

                                      78244c9f5ba84e82622891b66efaac83

                                      SHA1

                                      898ff0e8f505da93f559edc4c418be0ee274feba

                                      SHA256

                                      9c7381003d090bcc5e677bc813fba43f9adbb970b339fc78318fd3c110d43bf1

                                      SHA512

                                      b48f5bd3ff991caa0bd18dae8b395e799e3aa294336e9d821975582a13d7bf696b4591f64af06b65b7ec56b4d8956fd827f7e89e4ffae8e10f5e4d783922a6cb

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      bf31ea2ff96f4f3fe65cf79451ec1e99

                                      SHA1

                                      7ed02d401a9c529e16b3c31fcb34388854d781a8

                                      SHA256

                                      e1d79c34ef8b851f93d48b6bfd46137f38411d2635f494f5ceac1b95e1bece25

                                      SHA512

                                      4024d2d6296184ce385fd44bb9318022098ee5a063e0f3cedfffeb51169b774ca2e5c7b3f4501bb7da43e9c9ddf9e4afc246ac9a6a74ceb04a2003e905a40646

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      c3d66fa3a537bebc51dc1695afbf7f0f

                                      SHA1

                                      837978711d76c283eeb8eaee2d89e986442d2d0d

                                      SHA256

                                      42ac8e0022967d6d11976de68603e0863f88852fac3e8233be1bffb507b95032

                                      SHA512

                                      417073ca13e70da11d93fe724b701446c5532bd1437e42cd876a3c924b9ef366551b9dd0d74ceee42e65d76d7a9baef2e0b13e2b9452e15c8b6f5987c0745932

                                    • C:\Users\Admin\Desktop\XClient.exe

                                      Filesize

                                      40KB

                                      MD5

                                      3d041e688978fba193da36a83afbaa08

                                      SHA1

                                      f3421df6c9158eb3179982579e87ca5a90868251

                                      SHA256

                                      08173a11d60c0dd4882797df0ae48014b4e04d7835369cf54310aca501e64fdc

                                      SHA512

                                      ac59f053ec4fc81633a608cf4a0864fbe6c1ad910b2f820b6873b85df90cd5c60646a1b3f65e5ca5fd85dedcc536b2022a2399d016175c9de32dea67d5e1c0cb

                                    • C:\Users\Admin\Downloads\XClient.zip

                                      Filesize

                                      19KB

                                      MD5

                                      0a4c3971b7839a4ab89dca6065a59da0

                                      SHA1

                                      4ec148375712e6a7921d1ab4bb3574a9eeadd16e

                                      SHA256

                                      8d098b789f9bc7e6e97f9e8913c5cdb8c9003f93520ef720d60cdbfdd9ff7179

                                      SHA512

                                      a3e839c198f6354e1b9613d0aab39999b5027629038eaad57a160be379bb7ed05e0322d76692b6be50b828c2db0281f11fd3eda11fc856a3f3b2c5da39be4d92

                                    • memory/3856-259-0x0000000000C50000-0x0000000000C60000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3856-266-0x000000001C9B0000-0x000000001C9BC000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/3856-267-0x000000001D2E0000-0x000000001D489000-memory.dmp

                                      Filesize

                                      1.7MB

                                    • memory/3856-268-0x000000001D2E0000-0x000000001D489000-memory.dmp

                                      Filesize

                                      1.7MB

                                    • memory/3856-276-0x0000000001420000-0x00000000014AE000-memory.dmp

                                      Filesize

                                      568KB