Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 00:42

General

  • Target

    XClient.exe

  • Size

    226KB

  • MD5

    40f4eee34a53b49b2fde39a2d9c8d008

  • SHA1

    dd3d92fa21287e354e2abc7f5562416bc1fbd226

  • SHA256

    533e8b8064eef542e06d9bb733ddb0f0f5a37d89bee5227b90a64a9420f30acb

  • SHA512

    ee399943be5c8891f9c2bc82f2ca20db4001c50ea5b396881294c570f7cb134ec2f93a5c017c76851dec467f4526ebc7137fe7dfdf4d3bf900c27e27c4e0228e

  • SSDEEP

    3072:EuVcFDfSCkbcAn0OLcX7e8SKfbzxcwg7es6/Vsb8VKTu549oJMfF/H9N3Ky9NzLP:EFab+reUhcX7elbKTua9bfF/H9d9n

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:1234

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2000-0-0x000007FEF63F3000-0x000007FEF63F4000-memory.dmp

    Filesize

    4KB

  • memory/2000-1-0x0000000001290000-0x00000000012CE000-memory.dmp

    Filesize

    248KB

  • memory/2000-2-0x000007FEF63F0000-0x000007FEF6DDC000-memory.dmp

    Filesize

    9.9MB

  • memory/2000-3-0x000007FEF63F3000-0x000007FEF63F4000-memory.dmp

    Filesize

    4KB

  • memory/2000-4-0x000007FEF63F0000-0x000007FEF6DDC000-memory.dmp

    Filesize

    9.9MB