General
-
Target
X64v1.4.exe
-
Size
76KB
-
Sample
250302-a89g2aysgz
-
MD5
1a6ce13e6ca5801d773725074d8127a6
-
SHA1
abc2d87c256950524ea6bc06466b7ad63dec042f
-
SHA256
0cea3395a719813d0a1bab5a21ded480f70b6da0cff2b8ff632a0d42bee303fe
-
SHA512
461708a2a62701c4af06d54e0c86fa5380c12a464a1e208c539f7835f4c5b0f3d4064377674759e0f9b237971b9414f9c39acf9da455aabacdb8ca2ea1018d10
-
SSDEEP
1536:F01NQngfiQr1jx9/9EBeJKYamex+3tDUUGcDl3nIAd7CK8byIMn:y1KgF/9+FYajk3tDUUGCBIa7CK8by1
Static task
static1
Behavioral task
behavioral1
Sample
X64v1.4.exe
Resource
win11-20250217-en
Malware Config
Extracted
xworm
80.76.49.15:1111
-
Install_directory
%AppData%
-
install_file
Xclient.exe
Targets
-
-
Target
X64v1.4.exe
-
Size
76KB
-
MD5
1a6ce13e6ca5801d773725074d8127a6
-
SHA1
abc2d87c256950524ea6bc06466b7ad63dec042f
-
SHA256
0cea3395a719813d0a1bab5a21ded480f70b6da0cff2b8ff632a0d42bee303fe
-
SHA512
461708a2a62701c4af06d54e0c86fa5380c12a464a1e208c539f7835f4c5b0f3d4064377674759e0f9b237971b9414f9c39acf9da455aabacdb8ca2ea1018d10
-
SSDEEP
1536:F01NQngfiQr1jx9/9EBeJKYamex+3tDUUGcDl3nIAd7CK8byIMn:y1KgF/9+FYajk3tDUUGCBIa7CK8by1
-
Detect Xworm Payload
-
Modifies WinLogon for persistence
-
UAC bypass
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables RegEdit via registry modification
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1