Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/03/2025, 13:31

General

  • Target

    UCO5J_Excellent2.0.exe

  • Size

    77KB

  • MD5

    fa9dbd782dfb5bf2f278c4bc6a73279e

  • SHA1

    dc01ceae67b4983111677b421691903a6eba150b

  • SHA256

    40d127a2d334e18d6e80801667a5d1e356f8c8a142563e360ab4f15796737428

  • SHA512

    dc0a3c67ea86b7dba4016800ddb03c27cc87932fe9244658675c470c3cb8b41f6fb1d1fe87feaef60acc80d65de26ba3ea5e100382bfbdf9c8e6829c5c1c3c04

  • SSDEEP

    1536:rdxon/N6GtnKEc2wP8UiQksF+bVMp23aYkFDoPjPT6HMXkzf2YyjjmO82C3hk:gnF6GtnKTB0Ckk+bVMS9TXU+biO8x3hk

Malware Config

Extracted

Family

xworm

C2

africa-wins.gl.at.ply.gg:41663

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UCO5J_Excellent2.0.exe
    "C:\Users\Admin\AppData\Local\Temp\UCO5J_Excellent2.0.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\UCO5J_Excellent2.0.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2720
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'UCO5J_Excellent2.0.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2624
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3040
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp35B0.tmp.bat""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp35B0.tmp.bat

    Filesize

    170B

    MD5

    8aac1e054419411efae4be92703d4f2a

    SHA1

    73c8aff31207536bab19a3fe9869cb89fa0d311d

    SHA256

    28ab16e624d1389ebae9d46375a93ecd5c360103250086461c2913d78565ca54

    SHA512

    dc06480961c317c478cb20d75f2e5f9622a8586695e0317aa289d3c8c83dd26561d6219d99f2a87176a8f21f1419b28b2de9674ada7e2a70a3c7c79c9a3b928b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    df5d4b6312508d2cae746c01f2470437

    SHA1

    5ff2d92dc9278898316289ef067b9c0ea1dcde31

    SHA256

    d574ec21517336b7a70218613ab408d041078451a430d8b50ab95f215d79ecdc

    SHA512

    f2244b5b3233919592b7ab18846fe9a613c1676fbd2c765551d4c188cfd871346b327afa1156debcf6a93802b2666d1db95850be402efa6c174b9557f545090e

  • memory/2624-15-0x000000001B570000-0x000000001B852000-memory.dmp

    Filesize

    2.9MB

  • memory/2624-16-0x0000000002A70000-0x0000000002A78000-memory.dmp

    Filesize

    32KB

  • memory/2684-2-0x000007FEF5E23000-0x000007FEF5E24000-memory.dmp

    Filesize

    4KB

  • memory/2684-0-0x000007FEF5E23000-0x000007FEF5E24000-memory.dmp

    Filesize

    4KB

  • memory/2684-32-0x0000000000A80000-0x0000000000B00000-memory.dmp

    Filesize

    512KB

  • memory/2684-33-0x0000000000A80000-0x0000000000B00000-memory.dmp

    Filesize

    512KB

  • memory/2684-34-0x0000000001FC0000-0x0000000001FCC000-memory.dmp

    Filesize

    48KB

  • memory/2684-1-0x0000000000B20000-0x0000000000B3A000-memory.dmp

    Filesize

    104KB

  • memory/2720-7-0x0000000002E30000-0x0000000002EB0000-memory.dmp

    Filesize

    512KB

  • memory/2720-8-0x000000001B770000-0x000000001BA52000-memory.dmp

    Filesize

    2.9MB

  • memory/2720-9-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

    Filesize

    32KB