Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 07:11

General

  • Target

    XClient.exe

  • Size

    68KB

  • MD5

    68604d1b2200493d620fbb9e70c3b182

  • SHA1

    dbffc3b9a4935f31120bd623849175c3072f748e

  • SHA256

    34e19eff1a2abfbcec9af157d91af7c502ec0f5cce0b58bb49b7a4c7a23d6f45

  • SHA512

    1f3f15895dc2b9ac282554d99ea7a7daa44ecd7c0c655c84851200c95b51e1a4688b4690f94a75343b1cbfa838f1aa3e975f4da329782e71436a9a8000d4e19d

  • SSDEEP

    1536:6RgdNcKAE/LQXYd4AnLv5DKA7VHg4kbzmWZf/kxTYSbFcAzOthYV:6wyoEXW4alxBkbzVapFbFrzOtCV

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:57562

kind-lap.gl.at.ply.gg:57562

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 3 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2892
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7B657CD3-A99A-48A3-BEB2-590EEA15A28D} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1496
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    68KB

    MD5

    68604d1b2200493d620fbb9e70c3b182

    SHA1

    dbffc3b9a4935f31120bd623849175c3072f748e

    SHA256

    34e19eff1a2abfbcec9af157d91af7c502ec0f5cce0b58bb49b7a4c7a23d6f45

    SHA512

    1f3f15895dc2b9ac282554d99ea7a7daa44ecd7c0c655c84851200c95b51e1a4688b4690f94a75343b1cbfa838f1aa3e975f4da329782e71436a9a8000d4e19d

  • memory/1496-13-0x0000000000DD0000-0x0000000000DE8000-memory.dmp

    Filesize

    96KB

  • memory/1824-0-0x000007FEF5D23000-0x000007FEF5D24000-memory.dmp

    Filesize

    4KB

  • memory/1824-1-0x0000000000980000-0x0000000000998000-memory.dmp

    Filesize

    96KB

  • memory/1824-6-0x000007FEF5D20000-0x000007FEF670C000-memory.dmp

    Filesize

    9.9MB

  • memory/1824-7-0x000007FEF5D23000-0x000007FEF5D24000-memory.dmp

    Filesize

    4KB

  • memory/1824-8-0x000007FEF5D20000-0x000007FEF670C000-memory.dmp

    Filesize

    9.9MB

  • memory/1824-9-0x00000000005F0000-0x00000000005FC000-memory.dmp

    Filesize

    48KB

  • memory/1824-15-0x000000001B670000-0x000000001B790000-memory.dmp

    Filesize

    1.1MB