Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win7-20240903-en
General
-
Target
Output.exe
-
Size
76KB
-
MD5
3609d5f3be639dfe2c7f3f0e7401b388
-
SHA1
f6720729a2af46c119922183b1932cff8cb2ff49
-
SHA256
ef5217e1b0ebd6fc1a8a75de80230998c30f810be4b594ddc711a587c34e12f7
-
SHA512
0aeb9abec472926d57e2441885cb88344ab5ff479149695ffc2ff394321b2b35301dd2b786d191fe9b8c67046a63baff46aa5c9a08c8934c0132483f46f99bca
-
SSDEEP
1536:71DLyqLA3qC85n5kuObTDLyqIA3qC85n5kuZb72:71DLvLA385n5zO/DLvIA385n5zZe
Malware Config
Extracted
xworm
5.0
192.168.1.3:9999
0x6vtRiVIhgdKOaX
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral2/files/0x000f00000001e6a2-7.dat family_xworm behavioral2/files/0x000c000000023b5b-16.dat family_xworm behavioral2/memory/4124-25-0x0000000000980000-0x000000000098E000-memory.dmp family_xworm behavioral2/memory/5116-26-0x0000000000030000-0x000000000003E000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Output.exe -
Executes dropped EXE 2 IoCs
pid Process 4124 XClie2nt.exe 5116 XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4124 XClie2nt.exe Token: SeDebugPrivilege 5116 XClient.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 4124 2184 Output.exe 86 PID 2184 wrote to memory of 4124 2184 Output.exe 86 PID 2184 wrote to memory of 5116 2184 Output.exe 87 PID 2184 wrote to memory of 5116 2184 Output.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Output.exe"C:\Users\Admin\AppData\Local\Temp\Output.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Roaming\XClie2nt.exe"C:\Users\Admin\AppData\Roaming\XClie2nt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD53e9272dbd6c68f0e34c615cc4c6ff14a
SHA1adce5d14cf7d799fd1b21bb51fa6ba45bb9cb706
SHA256933f628c9feaaa7264b39ac4b46b7451045840f3b5a0cf1bf5ab7a01cc7cab6d
SHA512624220b3a924d5256f7b9e9f5d4816684d61fd570f78735f6e3702db5d82c9b51a8d1df2d50fb9f9c196b7244ff7da135adfb957c71aee4e257d732a8b0fa909
-
Filesize
33KB
MD572e79fbac6daff0e93f1dc928f0c7a5b
SHA1e9955d767ba0d559ac4eda0f4008731db8d31d34
SHA256d30ef103972d2ad8920d95b16c406af4cdfb6cfd26a920bede3a7563c5d062b7
SHA5120959fd5f602f5ff62b500730193cf130ffa388271d3135a6730554bba446619c38a7764b0d1618f1346ee70c3e903a984b06ee115453e8d05d46439e18f90189