Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-01-2025 13:19

General

  • Target

    XClient.exe

  • Size

    30KB

  • MD5

    cc5d15bc880b21e4912741f3146847fe

  • SHA1

    864f8e552e145f4119cf87d2cd313c28e5922190

  • SHA256

    477c5ee702c71036f0bd3d9610c98c3b95231e586d98b9595a13bca8a9719ada

  • SHA512

    c989affb9a05f369d6c7dd37ca135cb99c0792a1265e6e4f73f5af8c4f75e0177529e783652cb6b9d93f67b857ea59fb7c7abbed0db84481d549204c8e948740

  • SSDEEP

    384:K7wTA+5OfPgEBQqWvfcQLZe3s80hYACSqR/inw2uRugtFuBLTIOZw/WVnvn9IkV3:UrgECfLH8MYAoR/iw2uBFE9RiOqh0bl

Malware Config

Extracted

Family

xworm

Version

3.1

C2

airport-forums.gl.at.ply.gg:20417

Mutex

ZPSZiwa5h9FUM0MJ

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Users\Admin\AppData\Local\Temp\adofvc.exe
      "C:\Users\Admin\AppData\Local\Temp\adofvc.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:4884
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
      PID:4552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\adofvc.exe

      Filesize

      436KB

      MD5

      22ba54cbf5c8a41d64acc90f467c1fb5

      SHA1

      5f61b932b5e151a4a460ada8e5ae8b268093a98f

      SHA256

      c02c44870579dcd8208b140dd85066bd7a468934d49b227aa24e6e62b951c35d

      SHA512

      cc62b9edaff1fc771e721acef84e854d93b5210f2148fa62dc4a0e3f3c8548e0686a8c250aad4292f380fdf4c50d746ef1309f3b9995518faa3d0fc207102295

    • memory/3124-0-0x00007FF9F68C3000-0x00007FF9F68C5000-memory.dmp

      Filesize

      8KB

    • memory/3124-1-0x0000000000DD0000-0x0000000000DDE000-memory.dmp

      Filesize

      56KB

    • memory/3124-2-0x00007FF9F68C0000-0x00007FF9F7382000-memory.dmp

      Filesize

      10.8MB

    • memory/3124-3-0x00007FF9F68C0000-0x00007FF9F7382000-memory.dmp

      Filesize

      10.8MB

    • memory/3124-4-0x000000001BA60000-0x000000001BA6A000-memory.dmp

      Filesize

      40KB

    • memory/4884-13-0x0000000002530000-0x0000000002531000-memory.dmp

      Filesize

      4KB

    • memory/4884-14-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/4884-15-0x0000000002530000-0x0000000002531000-memory.dmp

      Filesize

      4KB

    • memory/4884-16-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/4884-17-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB