Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1041s -
max time network
1026s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/01/2025, 13:05
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win11-20241007-en
9 signatures
150 seconds
General
-
Target
XClient.exe
-
Size
37KB
-
MD5
57d5ddc2d3726c27b999b78835847723
-
SHA1
95856a3ca2fe5398b39ff6d0b96ecead3dcba5ae
-
SHA256
d273c5a7fc67ffe825da917d8096a684615baa87cfa6ef2203dca9072947bf96
-
SHA512
3cc367d83274bffb4502a2cb523d828d747d50ac5bed9b9f9f215ba64a795ddddf4aa5a5322762a7aa130ac2d39c42ea4c3c8b7abdd6f2ab1e7a383c13d58a0c
-
SSDEEP
768:iR2u+a5hfcss3M6tQqb3rZTFL9P+sOMhTbA:iR2u7e56qFFL9P+sOMNU
Score
10/10
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:7000
147.185.221.22:7000
Mutex
hli2xFOEY4GGN5gH
Attributes
-
Install_directory
%AppData%
-
install_file
joseph.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4960-1-0x0000000000B80000-0x0000000000B90000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\joseph.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\joseph.lnk XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\joseph = "C:\\Users\\Admin\\AppData\\Roaming\\joseph.exe" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe 4960 XClient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4960 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4960 XClient.exe