Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    04/03/2025, 22:26

General

  • Target

    XClient.exe

  • Size

    162KB

  • MD5

    91331ecd6344f80b02ccac9760a3fcbe

  • SHA1

    572029a44d99a64fbd8ca759ddd41a3391f3abb3

  • SHA256

    c5a25cc0d10e27fab14c3563e826bef321f31c5128026b30227cddef219d2b85

  • SHA512

    5a67bb04be2f462b34e6e17208d6d6ce045c0602b6b8c6fa03564c6577e1875f33abecdcb4cc6dc302b52c23de6ac0bb8832e0a2c17e738ded74357fb7f4ae35

  • SSDEEP

    3072:I20sqx/l+bwQ/7Wb1Olk3oM5yBz65/M6If+3Js+3JFkKeTno:bA/Mbn/77y5yxBt25

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/kADeGNZE

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5892
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2568
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4140
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:1720
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4020
  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:6112
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:1160
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:4368
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      PID:2376
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    3eb3833f769dd890afc295b977eab4b4

    SHA1

    e857649b037939602c72ad003e5d3698695f436f

    SHA256

    c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

    SHA512

    c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    038c4864c903036cd9429e62dea6d90a

    SHA1

    4390a9e42be40e6976de45267f193059c2334b20

    SHA256

    80182c8153f811f3d29ddcad7ef7082b119ead20f4876c6d4b5c24ba68fc5990

    SHA512

    b97d332ccbbb8eeedcda72bed326f4818b2e338bf79f14f5ba8cf86029d87f46f8b9756b49ea1338e7fb6b46a694a61b0ca22476c40b72b36ad437bf2f88c2d1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    6a807b1c91ac66f33f88a787d64904c1

    SHA1

    83c554c7de04a8115c9005709e5cd01fca82c5d3

    SHA256

    155314c1c86d8d4e5b802f1eef603c5dd4a2f7c949f069a38af5ba4959bd8256

    SHA512

    29f2d9f30fc081e7fe6e9fb772c810c9be0422afdc6aff5a286f49a990ededebcf0d083798c2d9f41ad8434393c6d0f5fa6df31226d9c3511ba2a41eb4a65200

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    535515ab6327afb6afc16fdfb1e28c4f

    SHA1

    7b45d1b6c09d9dfeb6c74ee614641c09cdda3a32

    SHA256

    823a555cbce774ad089d4f41fd3b80b00331ec00a0ee8b0f03a68187e36001d5

    SHA512

    2533f7fd40674aa6844c7c4d2b0ab12142c081c2b7be9b8f866c30a90b708023883ada1fc540d2fa6211000ee16fedbd3ed0dc9c8c9ed6965b4d96ea132abc15

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    dece17e8b3d1cc0b29cf5a977b68730e

    SHA1

    e24e56624c7701b349a5a07642e9b9d902196f55

    SHA256

    1f78459e977340a708884f6f42099ad6914a855ee98cba6c09bbb2b56dbaa908

    SHA512

    8a966a00209f43ebc4051c3433aa12ce4e9a2f85acfb428f87fc7fd222549085c115df2372cbc29836a926950a38400a68e29c6f89c8f237a14c7833a92eb8a4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    d642fc7d81b5bbd83917ddfe2d825b68

    SHA1

    08e8e419f14f199dda7d8c3fce76dda78533c98d

    SHA256

    fe31f6f997ab553aeaf225f341bc190d1fa11827ffcafd8ce0f2d5d9ab303bad

    SHA512

    99e097a8a23e2970e576f427ba9056ab47bc9251ac4844c6dbce5d0d5cd642aae1580af667737c4736210e5de79c50920a3ebc07add300b79f2bc0f2fdf6559b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    c6f7c13669b0a683c8e11fec2860e043

    SHA1

    8b691719ac441aaf410d848ac01b4faff2603d4c

    SHA256

    29173c8d4dfb89cc2e244d3bf23db070c4aa1e08420fb62808c45226e12ea295

    SHA512

    710ac292d1328a2a267f96c1a6398027f1611435d8a9e1273745222242c653e2133f487f35f14cb76cb17d05da1439db9b2798c16af0695450dd5dae9f25941b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    0532f2586e1cf166570736b353be12d4

    SHA1

    b086cded3ff618fb0f0c9a91a9f809c63ae4ac0f

    SHA256

    0e0aac6e2e0ed4c6e206090a7af4145863413d34cb48d3d41c1efe7b6f1861b5

    SHA512

    8ee4bbba2cd6cf968786a28fcef37d5a428d6dfd18958b6819e6ace06f416e8b9a331ea3dfdedb24e64aae295057218cd15ab813658af2dfb979bffb59a638c6

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ln02cs2w.gew.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    162KB

    MD5

    91331ecd6344f80b02ccac9760a3fcbe

    SHA1

    572029a44d99a64fbd8ca759ddd41a3391f3abb3

    SHA256

    c5a25cc0d10e27fab14c3563e826bef321f31c5128026b30227cddef219d2b85

    SHA512

    5a67bb04be2f462b34e6e17208d6d6ce045c0602b6b8c6fa03564c6577e1875f33abecdcb4cc6dc302b52c23de6ac0bb8832e0a2c17e738ded74357fb7f4ae35

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk

    Filesize

    1KB

    MD5

    6da7b10776230ed0cee39147bbde7915

    SHA1

    bc0d3ae97d461ba09b62a907cb369000cc47e136

    SHA256

    8fbbc0db13dce367b22e3a34ef04b4705ce3631bb1b40876ca1664f5b22c4b31

    SHA512

    fe48a56a78dcd852ef2d75ad12f0df1b70c8abb5a3c5fd38d4e223d5ea1ced8040cfa352935a70bb3f5cb457169770f6824ed76bd25c2a4f48c9251a3748acd6

  • memory/568-63-0x00007FFBE3910000-0x00007FFBE43D2000-memory.dmp

    Filesize

    10.8MB

  • memory/568-1-0x0000000000250000-0x000000000027E000-memory.dmp

    Filesize

    184KB

  • memory/568-0-0x00007FFBE3913000-0x00007FFBE3915000-memory.dmp

    Filesize

    8KB

  • memory/568-58-0x00007FFBE3910000-0x00007FFBE43D2000-memory.dmp

    Filesize

    10.8MB

  • memory/568-59-0x00007FFBE3913000-0x00007FFBE3915000-memory.dmp

    Filesize

    8KB

  • memory/568-60-0x00007FFBE3910000-0x00007FFBE43D2000-memory.dmp

    Filesize

    10.8MB

  • memory/5892-14-0x00007FFBE3910000-0x00007FFBE43D2000-memory.dmp

    Filesize

    10.8MB

  • memory/5892-19-0x00007FFBE3910000-0x00007FFBE43D2000-memory.dmp

    Filesize

    10.8MB

  • memory/5892-13-0x00007FFBE3910000-0x00007FFBE43D2000-memory.dmp

    Filesize

    10.8MB

  • memory/5892-12-0x00007FFBE3910000-0x00007FFBE43D2000-memory.dmp

    Filesize

    10.8MB

  • memory/5892-11-0x000002A11E630000-0x000002A11E652000-memory.dmp

    Filesize

    136KB

  • memory/5892-15-0x00007FFBE3910000-0x00007FFBE43D2000-memory.dmp

    Filesize

    10.8MB

  • memory/5892-18-0x00007FFBE3910000-0x00007FFBE43D2000-memory.dmp

    Filesize

    10.8MB