Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04/03/2025, 22:26
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
XClient.exe
-
Size
162KB
-
MD5
91331ecd6344f80b02ccac9760a3fcbe
-
SHA1
572029a44d99a64fbd8ca759ddd41a3391f3abb3
-
SHA256
c5a25cc0d10e27fab14c3563e826bef321f31c5128026b30227cddef219d2b85
-
SHA512
5a67bb04be2f462b34e6e17208d6d6ce045c0602b6b8c6fa03564c6577e1875f33abecdcb4cc6dc302b52c23de6ac0bb8832e0a2c17e738ded74357fb7f4ae35
-
SSDEEP
3072:I20sqx/l+bwQ/7Wb1Olk3oM5yBz65/M6If+3Js+3JFkKeTno:bA/Mbn/77y5yxBt25
Malware Config
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/kADeGNZE
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/568-1-0x0000000000250000-0x000000000027E000-memory.dmp family_xworm behavioral1/files/0x000c000000027ec3-64.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2568 powershell.exe 4140 powershell.exe 1720 powershell.exe 6112 powershell.exe 1160 powershell.exe 4368 powershell.exe 2376 powershell.exe 5892 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe -
Executes dropped EXE 1 IoCs
pid Process 1312 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 16 pastebin.com 17 pastebin.com 40 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4020 schtasks.exe 4988 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 5892 powershell.exe 5892 powershell.exe 2568 powershell.exe 2568 powershell.exe 4140 powershell.exe 4140 powershell.exe 1720 powershell.exe 1720 powershell.exe 568 XClient.exe 6112 powershell.exe 6112 powershell.exe 1160 powershell.exe 1160 powershell.exe 4368 powershell.exe 4368 powershell.exe 2376 powershell.exe 2376 powershell.exe 1312 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 568 XClient.exe Token: SeDebugPrivilege 5892 powershell.exe Token: SeIncreaseQuotaPrivilege 5892 powershell.exe Token: SeSecurityPrivilege 5892 powershell.exe Token: SeTakeOwnershipPrivilege 5892 powershell.exe Token: SeLoadDriverPrivilege 5892 powershell.exe Token: SeSystemProfilePrivilege 5892 powershell.exe Token: SeSystemtimePrivilege 5892 powershell.exe Token: SeProfSingleProcessPrivilege 5892 powershell.exe Token: SeIncBasePriorityPrivilege 5892 powershell.exe Token: SeCreatePagefilePrivilege 5892 powershell.exe Token: SeBackupPrivilege 5892 powershell.exe Token: SeRestorePrivilege 5892 powershell.exe Token: SeShutdownPrivilege 5892 powershell.exe Token: SeDebugPrivilege 5892 powershell.exe Token: SeSystemEnvironmentPrivilege 5892 powershell.exe Token: SeRemoteShutdownPrivilege 5892 powershell.exe Token: SeUndockPrivilege 5892 powershell.exe Token: SeManageVolumePrivilege 5892 powershell.exe Token: 33 5892 powershell.exe Token: 34 5892 powershell.exe Token: 35 5892 powershell.exe Token: 36 5892 powershell.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeIncreaseQuotaPrivilege 2568 powershell.exe Token: SeSecurityPrivilege 2568 powershell.exe Token: SeTakeOwnershipPrivilege 2568 powershell.exe Token: SeLoadDriverPrivilege 2568 powershell.exe Token: SeSystemProfilePrivilege 2568 powershell.exe Token: SeSystemtimePrivilege 2568 powershell.exe Token: SeProfSingleProcessPrivilege 2568 powershell.exe Token: SeIncBasePriorityPrivilege 2568 powershell.exe Token: SeCreatePagefilePrivilege 2568 powershell.exe Token: SeBackupPrivilege 2568 powershell.exe Token: SeRestorePrivilege 2568 powershell.exe Token: SeShutdownPrivilege 2568 powershell.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeSystemEnvironmentPrivilege 2568 powershell.exe Token: SeRemoteShutdownPrivilege 2568 powershell.exe Token: SeUndockPrivilege 2568 powershell.exe Token: SeManageVolumePrivilege 2568 powershell.exe Token: 33 2568 powershell.exe Token: 34 2568 powershell.exe Token: 35 2568 powershell.exe Token: 36 2568 powershell.exe Token: SeDebugPrivilege 4140 powershell.exe Token: SeIncreaseQuotaPrivilege 4140 powershell.exe Token: SeSecurityPrivilege 4140 powershell.exe Token: SeTakeOwnershipPrivilege 4140 powershell.exe Token: SeLoadDriverPrivilege 4140 powershell.exe Token: SeSystemProfilePrivilege 4140 powershell.exe Token: SeSystemtimePrivilege 4140 powershell.exe Token: SeProfSingleProcessPrivilege 4140 powershell.exe Token: SeIncBasePriorityPrivilege 4140 powershell.exe Token: SeCreatePagefilePrivilege 4140 powershell.exe Token: SeBackupPrivilege 4140 powershell.exe Token: SeRestorePrivilege 4140 powershell.exe Token: SeShutdownPrivilege 4140 powershell.exe Token: SeDebugPrivilege 4140 powershell.exe Token: SeSystemEnvironmentPrivilege 4140 powershell.exe Token: SeRemoteShutdownPrivilege 4140 powershell.exe Token: SeUndockPrivilege 4140 powershell.exe Token: SeManageVolumePrivilege 4140 powershell.exe Token: 33 4140 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 568 XClient.exe 1312 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 568 wrote to memory of 5892 568 XClient.exe 88 PID 568 wrote to memory of 5892 568 XClient.exe 88 PID 568 wrote to memory of 2568 568 XClient.exe 91 PID 568 wrote to memory of 2568 568 XClient.exe 91 PID 568 wrote to memory of 4140 568 XClient.exe 93 PID 568 wrote to memory of 4140 568 XClient.exe 93 PID 568 wrote to memory of 1720 568 XClient.exe 95 PID 568 wrote to memory of 1720 568 XClient.exe 95 PID 568 wrote to memory of 4020 568 XClient.exe 98 PID 568 wrote to memory of 4020 568 XClient.exe 98 PID 1312 wrote to memory of 6112 1312 svchost.exe 104 PID 1312 wrote to memory of 6112 1312 svchost.exe 104 PID 1312 wrote to memory of 1160 1312 svchost.exe 106 PID 1312 wrote to memory of 1160 1312 svchost.exe 106 PID 1312 wrote to memory of 4368 1312 svchost.exe 108 PID 1312 wrote to memory of 4368 1312 svchost.exe 108 PID 1312 wrote to memory of 2376 1312 svchost.exe 110 PID 1312 wrote to memory of 2376 1312 svchost.exe 110 PID 1312 wrote to memory of 4988 1312 svchost.exe 112 PID 1312 wrote to memory of 4988 1312 svchost.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4988
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5038c4864c903036cd9429e62dea6d90a
SHA14390a9e42be40e6976de45267f193059c2334b20
SHA25680182c8153f811f3d29ddcad7ef7082b119ead20f4876c6d4b5c24ba68fc5990
SHA512b97d332ccbbb8eeedcda72bed326f4818b2e338bf79f14f5ba8cf86029d87f46f8b9756b49ea1338e7fb6b46a694a61b0ca22476c40b72b36ad437bf2f88c2d1
-
Filesize
1KB
MD56a807b1c91ac66f33f88a787d64904c1
SHA183c554c7de04a8115c9005709e5cd01fca82c5d3
SHA256155314c1c86d8d4e5b802f1eef603c5dd4a2f7c949f069a38af5ba4959bd8256
SHA51229f2d9f30fc081e7fe6e9fb772c810c9be0422afdc6aff5a286f49a990ededebcf0d083798c2d9f41ad8434393c6d0f5fa6df31226d9c3511ba2a41eb4a65200
-
Filesize
1KB
MD5535515ab6327afb6afc16fdfb1e28c4f
SHA17b45d1b6c09d9dfeb6c74ee614641c09cdda3a32
SHA256823a555cbce774ad089d4f41fd3b80b00331ec00a0ee8b0f03a68187e36001d5
SHA5122533f7fd40674aa6844c7c4d2b0ab12142c081c2b7be9b8f866c30a90b708023883ada1fc540d2fa6211000ee16fedbd3ed0dc9c8c9ed6965b4d96ea132abc15
-
Filesize
1KB
MD5dece17e8b3d1cc0b29cf5a977b68730e
SHA1e24e56624c7701b349a5a07642e9b9d902196f55
SHA2561f78459e977340a708884f6f42099ad6914a855ee98cba6c09bbb2b56dbaa908
SHA5128a966a00209f43ebc4051c3433aa12ce4e9a2f85acfb428f87fc7fd222549085c115df2372cbc29836a926950a38400a68e29c6f89c8f237a14c7833a92eb8a4
-
Filesize
1KB
MD5d642fc7d81b5bbd83917ddfe2d825b68
SHA108e8e419f14f199dda7d8c3fce76dda78533c98d
SHA256fe31f6f997ab553aeaf225f341bc190d1fa11827ffcafd8ce0f2d5d9ab303bad
SHA51299e097a8a23e2970e576f427ba9056ab47bc9251ac4844c6dbce5d0d5cd642aae1580af667737c4736210e5de79c50920a3ebc07add300b79f2bc0f2fdf6559b
-
Filesize
1KB
MD5c6f7c13669b0a683c8e11fec2860e043
SHA18b691719ac441aaf410d848ac01b4faff2603d4c
SHA25629173c8d4dfb89cc2e244d3bf23db070c4aa1e08420fb62808c45226e12ea295
SHA512710ac292d1328a2a267f96c1a6398027f1611435d8a9e1273745222242c653e2133f487f35f14cb76cb17d05da1439db9b2798c16af0695450dd5dae9f25941b
-
Filesize
1KB
MD50532f2586e1cf166570736b353be12d4
SHA1b086cded3ff618fb0f0c9a91a9f809c63ae4ac0f
SHA2560e0aac6e2e0ed4c6e206090a7af4145863413d34cb48d3d41c1efe7b6f1861b5
SHA5128ee4bbba2cd6cf968786a28fcef37d5a428d6dfd18958b6819e6ace06f416e8b9a331ea3dfdedb24e64aae295057218cd15ab813658af2dfb979bffb59a638c6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
162KB
MD591331ecd6344f80b02ccac9760a3fcbe
SHA1572029a44d99a64fbd8ca759ddd41a3391f3abb3
SHA256c5a25cc0d10e27fab14c3563e826bef321f31c5128026b30227cddef219d2b85
SHA5125a67bb04be2f462b34e6e17208d6d6ce045c0602b6b8c6fa03564c6577e1875f33abecdcb4cc6dc302b52c23de6ac0bb8832e0a2c17e738ded74357fb7f4ae35
-
Filesize
1KB
MD56da7b10776230ed0cee39147bbde7915
SHA1bc0d3ae97d461ba09b62a907cb369000cc47e136
SHA2568fbbc0db13dce367b22e3a34ef04b4705ce3631bb1b40876ca1664f5b22c4b31
SHA512fe48a56a78dcd852ef2d75ad12f0df1b70c8abb5a3c5fd38d4e223d5ea1ced8040cfa352935a70bb3f5cb457169770f6824ed76bd25c2a4f48c9251a3748acd6