Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 17:48
Behavioral task
behavioral1
Sample
XClient98.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
XClient98.exe
-
Size
79KB
-
MD5
6e23cb25aeeb8c74e7d04e4e23748fcc
-
SHA1
776a3b5471863a46eb2996ed50e2353e6c8851a9
-
SHA256
5be52bd9ea6f818f2c296ec5a103f1fca3d5c405cf74b3a81f07c7ab03106b09
-
SHA512
4e2166f96e1479fe897cf1a245e4378b54252bca364643c5129ce927368386529b946877248e885b69e53a955b892d4b9dbd8edb67104e0c609d9ce7f4d33ff7
-
SSDEEP
1536:H2Oh6roZ3MYnhYoCxA4t7gb2Vck/OM9E+Ao9UEOOUP:H2O0rQMEDCS4+b2frW+5OOm
Malware Config
Extracted
Family
xworm
C2
147.185.221.25:25794
Attributes
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2104-1-0x0000000000F10000-0x0000000000F2A000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2104 XClient98.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2104 XClient98.exe Token: SeDebugPrivilege 2104 XClient98.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2104 XClient98.exe