Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 22:44
Behavioral task
behavioral1
Sample
discordnukerv3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
discordnukerv3.exe
Resource
win10v2004-20250217-en
General
-
Target
discordnukerv3.exe
-
Size
35KB
-
MD5
ec09727a0ebaf761bcaf7c5f3b799008
-
SHA1
d6aa602f2e7883d0fe79585ddf2093b1b513f05a
-
SHA256
b412ff0701b365206f9da406214e5dccf883f77a00b750658fad687e95a4e2a6
-
SHA512
01a113512eaa04af6f2493a24806054bb4050e1273e6fd2eacc86457df0b414e9bdd2f841b040c17cfa2c19244423a262b0a71220e1bb1861148eada44148cbc
-
SSDEEP
768:mo7zWVFe5fzEky1TxVPemVFyw9brVO/h6yIL:X7zWVFe6Rq8Fr9b5O/oBL
Malware Config
Extracted
xworm
5.0
127.0.0.1:38571
0KgKOnJZ1WSTbd2d
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2660-1-0x0000000000140000-0x0000000000150000-memory.dmp family_xworm behavioral1/files/0x0007000000012117-10.dat family_xworm behavioral1/memory/2588-12-0x0000000000E70000-0x0000000000E80000-memory.dmp family_xworm behavioral1/memory/2364-16-0x00000000002D0000-0x00000000002E0000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk discordnukerv3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk discordnukerv3.exe -
Executes dropped EXE 3 IoCs
pid Process 2588 XClient.exe 1324 XClient.exe 2364 XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" discordnukerv3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2660 discordnukerv3.exe Token: SeDebugPrivilege 2660 discordnukerv3.exe Token: SeDebugPrivilege 2588 XClient.exe Token: SeDebugPrivilege 1324 XClient.exe Token: SeDebugPrivilege 2364 XClient.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2804 2660 discordnukerv3.exe 30 PID 2660 wrote to memory of 2804 2660 discordnukerv3.exe 30 PID 2660 wrote to memory of 2804 2660 discordnukerv3.exe 30 PID 2808 wrote to memory of 2588 2808 taskeng.exe 33 PID 2808 wrote to memory of 2588 2808 taskeng.exe 33 PID 2808 wrote to memory of 2588 2808 taskeng.exe 33 PID 2808 wrote to memory of 1324 2808 taskeng.exe 35 PID 2808 wrote to memory of 1324 2808 taskeng.exe 35 PID 2808 wrote to memory of 1324 2808 taskeng.exe 35 PID 2808 wrote to memory of 2364 2808 taskeng.exe 36 PID 2808 wrote to memory of 2364 2808 taskeng.exe 36 PID 2808 wrote to memory of 2364 2808 taskeng.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\discordnukerv3.exe"C:\Users\Admin\AppData\Local\Temp\discordnukerv3.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1B6B1CB7-1DD8-455D-B39B-E499ECB7B60E} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5ec09727a0ebaf761bcaf7c5f3b799008
SHA1d6aa602f2e7883d0fe79585ddf2093b1b513f05a
SHA256b412ff0701b365206f9da406214e5dccf883f77a00b750658fad687e95a4e2a6
SHA51201a113512eaa04af6f2493a24806054bb4050e1273e6fd2eacc86457df0b414e9bdd2f841b040c17cfa2c19244423a262b0a71220e1bb1861148eada44148cbc