Analysis
-
max time kernel
42s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 14:38
Behavioral task
behavioral1
Sample
XClien2t.exe
Resource
win10v2004-20241007-en
General
-
Target
XClien2t.exe
-
Size
39KB
-
MD5
cb66c0aecefa400bd702fdfce6768867
-
SHA1
86eff3a8079fac5ba6bee0c7305dcfb02bf11dff
-
SHA256
e984d24a32bfbd3da67c941e130e6cc73efb0dbd343f549b49626fd059a84c7e
-
SHA512
f9436c34ebfe6ea6db97eaef00d0e5c8b5196fe7e01f6c4cb3ea811c98a80b6e735de8e74bb5a2b0404f69001f1aeae160386a9bb402f4ba3da65bb7d5458831
-
SSDEEP
768:Inp2iB3sNvzK2Awjzef/YEW7KbiCqEoFN9UeGOphFjtYGK:RiB8V6f/WlCq9FN9UvOplBK
Malware Config
Extracted
xworm
5.0
https://pastebin.com/raw/s98jTNJs:1
skS6kMhEKAoBazrr
-
Install_directory
%Userprofile%
-
install_file
msconfig.exe
-
pastebin_url
https://pastebin.com/raw/s98jTNJs
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3724-1-0x00000000005C0000-0x00000000005D0000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation XClien2t.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msconfig.lnk XClien2t.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msconfig.lnk XClien2t.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msconfig = "C:\\Users\\Admin\\msconfig.exe" XClien2t.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 14 pastebin.com 15 pastebin.com 17 pastebin.com 22 pastebin.com 25 pastebin.com 28 pastebin.com 30 pastebin.com 44 pastebin.com 21 pastebin.com 29 pastebin.com 31 pastebin.com 46 pastebin.com 47 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3220 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3724 XClien2t.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3724 wrote to memory of 3220 3724 XClien2t.exe 82 PID 3724 wrote to memory of 3220 3724 XClien2t.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClien2t.exe"C:\Users\Admin\AppData\Local\Temp\XClien2t.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msconfig" /tr "C:\Users\Admin\msconfig.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3220
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1