Analysis

  • max time kernel
    298s
  • max time network
    300s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-01-2025 13:08

General

  • Target

    Steam_Setup.exe

  • Size

    321KB

  • MD5

    847b0e2d9aec6a7a4429cb31e9718468

  • SHA1

    6b8e865b06e214250fef0ef7190c51c386c3c681

  • SHA256

    c5d1a93c06cfd5547096cf37da77bede86b87ea453c941601c315b949f6f5b1c

  • SHA512

    aa456b7e3a9591ee3d91198bd6d4721335b9bf07b5adea9365dd8a598b99c9b3d085cb5f961e5bda4d4fe9cd6c66f42ba238f32d747d9b6ca3e412d80047f08d

  • SSDEEP

    6144:7xsyVbxd+GIIIIIIIhIIIIIIIIIIIIIIIU:1sv

Score
10/10

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • pastebin_url

    https://pastebin.com/raw/ay20NBKe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Steam_Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Steam_Setup.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    PID:844
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
    1⤵
      PID:4572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/844-0-0x00007FFAA10A3000-0x00007FFAA10A5000-memory.dmp

      Filesize

      8KB

    • memory/844-1-0x0000000000D40000-0x0000000000D96000-memory.dmp

      Filesize

      344KB

    • memory/844-6-0x00007FFAA10A0000-0x00007FFAA1B62000-memory.dmp

      Filesize

      10.8MB

    • memory/844-7-0x00007FFAA10A3000-0x00007FFAA10A5000-memory.dmp

      Filesize

      8KB

    • memory/844-8-0x00007FFAA10A0000-0x00007FFAA1B62000-memory.dmp

      Filesize

      10.8MB