Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 17:24
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20250217-en
Errors
General
-
Target
XClient.exe
-
Size
67KB
-
MD5
51c54850a03f6858fe61e195110f33d9
-
SHA1
6e804a790b2b9a63f02d756a963fb76472d789cf
-
SHA256
9ee2b4dfcae8b6e7681dc6691ffd4dcfb521d061188b805e4c09f4151bbb9674
-
SHA512
642e969c5dc7165cf63dda7423ea42042878949909e860a73fabeb1bd9b2083fe026a705eb94be99fc68f691f4ca0a3ed820037afb2a35323e628b52941ec16c
-
SSDEEP
1536:60UL9WC16LIK6u/VO2kbP8cnnSVzS06H3OCIDO495:HULOLXA2kbP8MO/C495
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
Sihost.exe
-
pastebin_url
https://pastebin.com/raw/hA5YVNf1
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2816-1-0x0000000000AD0000-0x0000000000AE8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2908 powershell.exe 2700 powershell.exe 1740 powershell.exe 1048 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sihost.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sihost.lnk XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sihost = "C:\\Users\\Admin\\AppData\\Roaming\\Sihost.exe" XClient.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2388 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2908 powershell.exe 2700 powershell.exe 1740 powershell.exe 1048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2816 XClient.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 1048 powershell.exe Token: SeDebugPrivilege 2816 XClient.exe Token: SeShutdownPrivilege 2752 shutdown.exe Token: SeRemoteShutdownPrivilege 2752 shutdown.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2908 2816 XClient.exe 30 PID 2816 wrote to memory of 2908 2816 XClient.exe 30 PID 2816 wrote to memory of 2908 2816 XClient.exe 30 PID 2816 wrote to memory of 2700 2816 XClient.exe 32 PID 2816 wrote to memory of 2700 2816 XClient.exe 32 PID 2816 wrote to memory of 2700 2816 XClient.exe 32 PID 2816 wrote to memory of 1740 2816 XClient.exe 34 PID 2816 wrote to memory of 1740 2816 XClient.exe 34 PID 2816 wrote to memory of 1740 2816 XClient.exe 34 PID 2816 wrote to memory of 1048 2816 XClient.exe 36 PID 2816 wrote to memory of 1048 2816 XClient.exe 36 PID 2816 wrote to memory of 1048 2816 XClient.exe 36 PID 2816 wrote to memory of 2388 2816 XClient.exe 38 PID 2816 wrote to memory of 2388 2816 XClient.exe 38 PID 2816 wrote to memory of 2388 2816 XClient.exe 38 PID 2816 wrote to memory of 2752 2816 XClient.exe 41 PID 2816 wrote to memory of 2752 2816 XClient.exe 41 PID 2816 wrote to memory of 2752 2816 XClient.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Sihost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Sihost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Sihost" /tr "C:\Users\Admin\AppData\Roaming\Sihost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2388
-
-
C:\Windows\system32\shutdown.exeshutdown.exe /f /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1728
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2164
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD502488046ec40c20ad1fc8a65c2773e56
SHA1b9acb08b03f2425235ff331433f6ed0dbdb3e17f
SHA2560ff048d0938f25896ed7d688ab09adfebbe6b2251b7d6c6654e025efc569c1be
SHA512d9ce62fea71a343a1d7c44d612b34f08690862be3f5295ccbe58d197a6f5f19ce8bd97f23214c3a54e6303a661fdb3d40254b5ab0ca3d0af5297be1820622924