Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    19-01-2025 09:25

General

  • Target

    XClient.exe

  • Size

    33KB

  • MD5

    9548ab8c25f4d68ee82f30614b894610

  • SHA1

    3cd430018f06d22887175307e2d14e4796d86222

  • SHA256

    2462f6663eed6000fe8db91857170246530df7ce156ced422c73b3f1000f3ec9

  • SHA512

    635eb77d7586411539f11b41135392c3ab096617f50f4b652226d073624b8d1f684c0a01203334ee2f9e5929a365a33d404f4e1f4c79752ec8736f3635f0d8ba

  • SSDEEP

    384:Tl0UMD9SszMJ11DcS/i8L7zZ3ZFsLcvSAOo6PRApkFTBLTsOZwpGN2v99IkuisoH:JoD9vQB3Z3HJvlOPVF89jsOjhCbg

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

7.tcp.eu.ngrok.io:11135

Mutex

Y5ZJT9tdrWfHkA4C

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1664-0-0x00007FFE0C413000-0x00007FFE0C415000-memory.dmp

    Filesize

    8KB

  • memory/1664-1-0x0000000000280000-0x000000000028E000-memory.dmp

    Filesize

    56KB

  • memory/1664-2-0x00007FFE0C410000-0x00007FFE0CED2000-memory.dmp

    Filesize

    10.8MB

  • memory/1664-3-0x00007FFE0C413000-0x00007FFE0C415000-memory.dmp

    Filesize

    8KB

  • memory/1664-4-0x00007FFE0C410000-0x00007FFE0CED2000-memory.dmp

    Filesize

    10.8MB