Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 02:41
Behavioral task
behavioral1
Sample
9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe
Resource
win10v2004-20250217-en
General
-
Target
9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe
-
Size
80KB
-
MD5
39ffa7b287f2d822703a6deea560dcbd
-
SHA1
34ae6406ec73ad02955cb7676b37489fdab1695b
-
SHA256
9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05
-
SHA512
7efa49f3c9ba846d6382e7683d64a5b00232c459028a177b07c0e4f28f06682bd3a219421a355515766007bee9e0dfcce5e243afba73290487057542a644cc40
-
SSDEEP
1536:GeKbbG1+cDVWr5hLbwWV5hcEW07Z4E+bCXsEN9qtgq6rLs4ORpmcG1h:GeKbb60r5hLbwWVcPk1+b8JY4ORpmth
Malware Config
Extracted
xworm
cause-indexes.gl.at.ply.gg:17210
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2216-1-0x0000000000C40000-0x0000000000C5A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2804 powershell.exe 2872 powershell.exe 2548 powershell.exe 2576 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2804 powershell.exe 2872 powershell.exe 2548 powershell.exe 2576 powershell.exe 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2804 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 30 PID 2216 wrote to memory of 2804 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 30 PID 2216 wrote to memory of 2804 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 30 PID 2216 wrote to memory of 2872 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 32 PID 2216 wrote to memory of 2872 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 32 PID 2216 wrote to memory of 2872 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 32 PID 2216 wrote to memory of 2548 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 34 PID 2216 wrote to memory of 2548 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 34 PID 2216 wrote to memory of 2548 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 34 PID 2216 wrote to memory of 2576 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 36 PID 2216 wrote to memory of 2576 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 36 PID 2216 wrote to memory of 2576 2216 9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe"C:\Users\Admin\AppData\Local\Temp\9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bf6e9b1f014c95b10ee4be8233591bf0
SHA14bf49440113aa531a326d2edfdf40aeafeeb04fd
SHA2564ba2dc4bda40eca3e2b03e1481700c26a3aca8ea67ad1471d4819100ed0ba1a2
SHA5122c7d6007b4f734d8d9ac432f1e7e69738538f256ddc7993f1b50b54f35ce8b431c4f196f85506343ed8525cbb33bbab2c59a554024dadb41d60b838c5b9b1872