Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/03/2025, 22:48

General

  • Target

    Output.exe

  • Size

    76KB

  • MD5

    3609d5f3be639dfe2c7f3f0e7401b388

  • SHA1

    f6720729a2af46c119922183b1932cff8cb2ff49

  • SHA256

    ef5217e1b0ebd6fc1a8a75de80230998c30f810be4b594ddc711a587c34e12f7

  • SHA512

    0aeb9abec472926d57e2441885cb88344ab5ff479149695ffc2ff394321b2b35301dd2b786d191fe9b8c67046a63baff46aa5c9a08c8934c0132483f46f99bca

  • SSDEEP

    1536:71DLyqLA3qC85n5kuObTDLyqIA3qC85n5kuZb72:71DLvLA385n5zO/DLvIA385n5zZe

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

192.168.1.3:9999

Mutex

0x6vtRiVIhgdKOaX

Attributes
  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Output.exe
    "C:\Users\Admin\AppData\Local\Temp\Output.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Roaming\XClie2nt.exe
      "C:\Users\Admin\AppData\Roaming\XClie2nt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1664
    • C:\Users\Admin\AppData\Roaming\XClient.exe
      "C:\Users\Admin\AppData\Roaming\XClient.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\XClie2nt.exe

    Filesize

    33KB

    MD5

    3e9272dbd6c68f0e34c615cc4c6ff14a

    SHA1

    adce5d14cf7d799fd1b21bb51fa6ba45bb9cb706

    SHA256

    933f628c9feaaa7264b39ac4b46b7451045840f3b5a0cf1bf5ab7a01cc7cab6d

    SHA512

    624220b3a924d5256f7b9e9f5d4816684d61fd570f78735f6e3702db5d82c9b51a8d1df2d50fb9f9c196b7244ff7da135adfb957c71aee4e257d732a8b0fa909

  • C:\Users\Admin\AppData\Roaming\XClient.exe

    Filesize

    33KB

    MD5

    72e79fbac6daff0e93f1dc928f0c7a5b

    SHA1

    e9955d767ba0d559ac4eda0f4008731db8d31d34

    SHA256

    d30ef103972d2ad8920d95b16c406af4cdfb6cfd26a920bede3a7563c5d062b7

    SHA512

    0959fd5f602f5ff62b500730193cf130ffa388271d3135a6730554bba446619c38a7764b0d1618f1346ee70c3e903a984b06ee115453e8d05d46439e18f90189

  • memory/1664-12-0x0000000000F20000-0x0000000000F2E000-memory.dmp

    Filesize

    56KB

  • memory/1664-14-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

    Filesize

    9.9MB

  • memory/1664-15-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

    Filesize

    9.9MB

  • memory/1904-0-0x000007FEF5D13000-0x000007FEF5D14000-memory.dmp

    Filesize

    4KB

  • memory/1904-1-0x0000000000A40000-0x0000000000A5A000-memory.dmp

    Filesize

    104KB

  • memory/2552-13-0x0000000000990000-0x000000000099E000-memory.dmp

    Filesize

    56KB