Analysis
-
max time kernel
35s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
Rexon-Paid_Executor.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rexon-Paid_Executor.exe
Resource
win10v2004-20250217-en
General
-
Target
Rexon-Paid_Executor.exe
-
Size
1.9MB
-
MD5
767e47b7200526d6d7b9f82d7d350523
-
SHA1
7c3c57726639fd44cab7a0014e5cad278386cb6f
-
SHA256
463d3278d31d58a43d7ee5716fc7040ca7f454778ff82595ae67e416a7219b0d
-
SHA512
a467c77065293aca2c6bebc3c84c6b5584bd808cf7c8fe53794f02224a401eaebac7b7255ae1ef7081bc17b57abd1116e47a51b87b0f02bc41668f702da139f4
-
SSDEEP
49152:ZCCiwOpZt1fyR59Z48fjQs9vlaEaBf6xxCWFWV/:gHjpAfrQw9i6xIWFc/
Malware Config
Extracted
xworm
5.0
display-equivalent.gl.at.ply.gg:12744
SkjG4THxcPjCb6Fx
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023c48-6.dat family_xworm behavioral2/memory/2512-16-0x0000000000090000-0x00000000000A2000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation Rexon-Paid_Executor.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Rexon-Paid_Executor.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Rexon-Paid_Executor.exe -
Executes dropped EXE 1 IoCs
pid Process 2512 Rexon-Paid_Executor.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" Rexon-Paid_Executor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings Rexon-Paid_Executor.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 224 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 224 vlc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2512 Rexon-Paid_Executor.exe Token: 33 2004 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2004 AUDIODG.EXE Token: 33 224 vlc.exe Token: SeIncBasePriorityPrivilege 224 vlc.exe Token: SeDebugPrivilege 2512 Rexon-Paid_Executor.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe 224 vlc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3528 wrote to memory of 2512 3528 Rexon-Paid_Executor.exe 85 PID 3528 wrote to memory of 2512 3528 Rexon-Paid_Executor.exe 85 PID 3528 wrote to memory of 224 3528 Rexon-Paid_Executor.exe 86 PID 3528 wrote to memory of 224 3528 Rexon-Paid_Executor.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rexon-Paid_Executor.exe"C:\Users\Admin\AppData\Local\Temp\Rexon-Paid_Executor.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Roaming\Rexon-Paid_Executor.exe"C:\Users\Admin\AppData\Roaming\Rexon-Paid_Executor.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\BAZINGA.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:224
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD508a7079e32a92cc7daf474bfdfa5fe93
SHA1f001555edb196d52cfe8b15f8b02beb98fd85c26
SHA2565cf8689e1f429a23c74937fefb19e64e24870d37cd9856c2207b5dc9ee574fbd
SHA5128115c8957427c479daf7f2a6ff97512c31bc781f7dc264acb58c976945f16cb854e1540e93483c4e3512b0a61fdcaa8ee67933820f04e549fb17ec1dcd86b091
-
Filesize
47KB
MD51142855d6cfd0deb6799a776fd04074f
SHA15206e413c09808dcfd996c7e1f570827f596b0d2
SHA256e38aa74da26c6d44a18639403ebe1d5a5ccf1aa4afd165983d8ee78861abb5d4
SHA5123640fbacdfed60e29ef21d8fea56db5dab82eafec9d0dcdcd500c77c448b4a9f46ddbc0047681d6048bd7446dd481284a922755b1251e0cf17533094b2e8cd0e