Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2025, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
WEN.exe
Resource
win7-20241010-en
General
-
Target
WEN.exe
-
Size
954KB
-
MD5
64100e4131cedaf6a889f560bc1e1c9b
-
SHA1
55f98aa796e01cea2cfd714770d974b9316bd848
-
SHA256
d4746c577ffb7985fc33252c77365679a6a39b68e4c0f3c60fd27d34a7539ebe
-
SHA512
ebcd5712c614a57dbb29539c8271b8adb23ab4615aa5b239b8eb59ef8fab458cd20154befcdb7fbdea19e7650ed14a14c8822662ffb70f4dba3e2a4e2d4177ad
-
SSDEEP
24576:+u6J33O0c+JY5UZ+XC0kGso6FaOYF0DuyKWY:Qu0c++OCvkGs9FaOnqmY
Malware Config
Extracted
xworm
176.96.137.181:2222
-
Install_directory
%AppData%
-
install_file
XClient2.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3620-17-0x00000000003D0000-0x00000000003EA000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5056 powershell.exe 4184 powershell.exe 3988 powershell.exe 4232 powershell.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sulfhydrate.vbs sulfhydrate.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient2.lnk RegSvcs.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient2.lnk RegSvcs.exe -
Executes dropped EXE 3 IoCs
pid Process 5048 sulfhydrate.exe 4952 XClient2.exe 4460 XClient2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient2 = "C:\\Users\\Admin\\AppData\\Roaming\\XClient2.exe" RegSvcs.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023d6d-8.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5048 set thread context of 3620 5048 sulfhydrate.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XClient2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XClient2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WEN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sulfhydrate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4232 powershell.exe 4232 powershell.exe 5056 powershell.exe 5056 powershell.exe 4184 powershell.exe 4184 powershell.exe 3988 powershell.exe 3988 powershell.exe 3620 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5048 sulfhydrate.exe 5048 sulfhydrate.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3620 RegSvcs.exe Token: SeDebugPrivilege 4232 powershell.exe Token: SeDebugPrivilege 5056 powershell.exe Token: SeDebugPrivilege 4184 powershell.exe Token: SeDebugPrivilege 3988 powershell.exe Token: SeDebugPrivilege 3620 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1192 WEN.exe 1192 WEN.exe 5048 sulfhydrate.exe 5048 sulfhydrate.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1192 WEN.exe 1192 WEN.exe 5048 sulfhydrate.exe 5048 sulfhydrate.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3620 RegSvcs.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1192 wrote to memory of 5048 1192 WEN.exe 87 PID 1192 wrote to memory of 5048 1192 WEN.exe 87 PID 1192 wrote to memory of 5048 1192 WEN.exe 87 PID 5048 wrote to memory of 3620 5048 sulfhydrate.exe 88 PID 5048 wrote to memory of 3620 5048 sulfhydrate.exe 88 PID 5048 wrote to memory of 3620 5048 sulfhydrate.exe 88 PID 5048 wrote to memory of 3620 5048 sulfhydrate.exe 88 PID 3620 wrote to memory of 4232 3620 RegSvcs.exe 93 PID 3620 wrote to memory of 4232 3620 RegSvcs.exe 93 PID 3620 wrote to memory of 4232 3620 RegSvcs.exe 93 PID 3620 wrote to memory of 5056 3620 RegSvcs.exe 96 PID 3620 wrote to memory of 5056 3620 RegSvcs.exe 96 PID 3620 wrote to memory of 5056 3620 RegSvcs.exe 96 PID 3620 wrote to memory of 4184 3620 RegSvcs.exe 99 PID 3620 wrote to memory of 4184 3620 RegSvcs.exe 99 PID 3620 wrote to memory of 4184 3620 RegSvcs.exe 99 PID 3620 wrote to memory of 3988 3620 RegSvcs.exe 102 PID 3620 wrote to memory of 3988 3620 RegSvcs.exe 102 PID 3620 wrote to memory of 3988 3620 RegSvcs.exe 102 PID 3620 wrote to memory of 1796 3620 RegSvcs.exe 104 PID 3620 wrote to memory of 1796 3620 RegSvcs.exe 104 PID 3620 wrote to memory of 1796 3620 RegSvcs.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\WEN.exe"C:\Users\Admin\AppData\Local\Temp\WEN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\surmit\sulfhydrate.exe"C:\Users\Admin\AppData\Local\Temp\WEN.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\WEN.exe"3⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RegSvcs.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient2.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient2.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient2" /tr "C:\Users\Admin\AppData\Roaming\XClient2.exe"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1796
-
-
-
-
C:\Users\Admin\AppData\Roaming\XClient2.exeC:\Users\Admin\AppData\Roaming\XClient2.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4952
-
C:\Users\Admin\AppData\Roaming\XClient2.exeC:\Users\Admin\AppData\Roaming\XClient2.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4460
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD58c0458bb9ea02d50565175e38d577e35
SHA1f0b50702cd6470f3c17d637908f83212fdbdb2f2
SHA256c578e86db701b9afa3626e804cf434f9d32272ff59fb32fa9a51835e5a148b53
SHA512804a47494d9a462ffa6f39759480700ecbe5a7f3a15ec3a6330176ed9c04695d2684bf6bf85ab86286d52e7b727436d0bb2e8da96e20d47740b5ce3f856b5d0f
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD572047861a7e1b401b9292d9f82c76872
SHA13b86b8b24c6ea06e31d8191e9793d21e8e1edbce
SHA2569da87165552c895cd3cd74b0071907f50c55094f7019720585082cff3609270e
SHA512fd1d6f59c68cdac3c4da9d7faa90923032bc3d24672adb37e27c2f80d6a18b8e39b30a7b3b61c740d2e15dc1745e181dffb83f759332936afd76d20c7aa97c05
-
Filesize
18KB
MD5e88057240b40ad3deab8dbed408091b2
SHA1d9cbb2c60ccc1e2a5fa4ca4ed8c6c7d11fb646f2
SHA25681b5257812cbd7c19b77b4509dc4f56f7deed8351728ff6840b629b9f2e84d72
SHA512ac58c710b336fbdbcde832254fd48f7d23d36c3e9e493e962e16ad8be3cd6f14773b871cd5d2c14a4eafd1984a9f974a22446a9e1926163f75f8baac07a851eb
-
Filesize
18KB
MD5fac059df3f7c5c55a4357cb5c2739fb5
SHA11730ac45abe14f887270be06e961ff6973c753ba
SHA25617c6cedac35c01e7fa7ba65fbc9439b2e4dd1032e9bea2336bb3fd37604c44c2
SHA512021a7aaf5bae9bca786426afa63fd45694bd8fbe14a32708daa6ff2f40b0b5b26f90b420585fba2e6e903fd6f45ca9c44761179ef242700348089fd9d47ddd07
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
954KB
MD564100e4131cedaf6a889f560bc1e1c9b
SHA155f98aa796e01cea2cfd714770d974b9316bd848
SHA256d4746c577ffb7985fc33252c77365679a6a39b68e4c0f3c60fd27d34a7539ebe
SHA512ebcd5712c614a57dbb29539c8271b8adb23ab4615aa5b239b8eb59ef8fab458cd20154befcdb7fbdea19e7650ed14a14c8822662ffb70f4dba3e2a4e2d4177ad
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b