Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win7-20240903-en
General
-
Target
Output.exe
-
Size
76KB
-
MD5
3609d5f3be639dfe2c7f3f0e7401b388
-
SHA1
f6720729a2af46c119922183b1932cff8cb2ff49
-
SHA256
ef5217e1b0ebd6fc1a8a75de80230998c30f810be4b594ddc711a587c34e12f7
-
SHA512
0aeb9abec472926d57e2441885cb88344ab5ff479149695ffc2ff394321b2b35301dd2b786d191fe9b8c67046a63baff46aa5c9a08c8934c0132483f46f99bca
-
SSDEEP
1536:71DLyqLA3qC85n5kuObTDLyqIA3qC85n5kuZb72:71DLvLA385n5zO/DLvIA385n5zZe
Malware Config
Extracted
xworm
5.0
192.168.1.3:9999
0x6vtRiVIhgdKOaX
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x00080000000120f9-5.dat family_xworm behavioral1/files/0x0008000000016399-11.dat family_xworm behavioral1/memory/1716-12-0x0000000001260000-0x000000000126E000-memory.dmp family_xworm behavioral1/memory/2388-13-0x00000000011E0000-0x00000000011EE000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 1716 XClie2nt.exe 2388 XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1716 XClie2nt.exe Token: SeDebugPrivilege 2388 XClient.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1716 1736 Output.exe 30 PID 1736 wrote to memory of 1716 1736 Output.exe 30 PID 1736 wrote to memory of 1716 1736 Output.exe 30 PID 1736 wrote to memory of 2388 1736 Output.exe 31 PID 1736 wrote to memory of 2388 1736 Output.exe 31 PID 1736 wrote to memory of 2388 1736 Output.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Output.exe"C:\Users\Admin\AppData\Local\Temp\Output.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\XClie2nt.exe"C:\Users\Admin\AppData\Roaming\XClie2nt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD53e9272dbd6c68f0e34c615cc4c6ff14a
SHA1adce5d14cf7d799fd1b21bb51fa6ba45bb9cb706
SHA256933f628c9feaaa7264b39ac4b46b7451045840f3b5a0cf1bf5ab7a01cc7cab6d
SHA512624220b3a924d5256f7b9e9f5d4816684d61fd570f78735f6e3702db5d82c9b51a8d1df2d50fb9f9c196b7244ff7da135adfb957c71aee4e257d732a8b0fa909
-
Filesize
33KB
MD572e79fbac6daff0e93f1dc928f0c7a5b
SHA1e9955d767ba0d559ac4eda0f4008731db8d31d34
SHA256d30ef103972d2ad8920d95b16c406af4cdfb6cfd26a920bede3a7563c5d062b7
SHA5120959fd5f602f5ff62b500730193cf130ffa388271d3135a6730554bba446619c38a7764b0d1618f1346ee70c3e903a984b06ee115453e8d05d46439e18f90189