Analysis
-
max time kernel
28s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 20:59
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20250217-en
10 signatures
150 seconds
General
-
Target
XClient.exe
-
Size
261KB
-
MD5
731d3f9b7421abe1e0ca7648fc43de46
-
SHA1
9cc2166087313ab5a19635cfb08c5207032d8f3f
-
SHA256
8465b9c75257a7dabef1a0d339559dc6724c250078c2db6885cdd9057c6866e4
-
SHA512
140b55febd0453f7c687fba1ddbeca1e16a47550615a097afa138bbfd9b998edebffcdb851900781c92ce1b377a4a649b2ce4a85477d64a7185c3ef19f4afb49
-
SSDEEP
3072:kP7QWMkq0+G6OnNVJB5DQorRb80xtYFGTx9IFE3bVyTgs/jdrlRpPNxhC6bUq9bd:1vGrNAs80f/FnbMTgs/jplRJNf9b6hM
Score
10/10
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3924-1-0x0000000000670000-0x00000000006BC000-memory.dmp family_xworm -
Xworm family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions XClient.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools XClient.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XClient.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 20 portmap.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum XClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 XClient.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe 3924 XClient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3924 XClient.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924