Resubmissions
04/03/2025, 20:13
250304-yzpy2azm13 10Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 20:13
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20241023-en
6 signatures
150 seconds
General
-
Target
XClient.exe
-
Size
36KB
-
MD5
06b61e40514ee41f4d669f67aba2ae4e
-
SHA1
b91b485f0e20bcad47ed547dc09dd1099ea2a1e7
-
SHA256
7da1826ec06ee54802049e6acaae47634cc23c0694bc231d10aa0a940fc3f917
-
SHA512
60490048e6332f036827727073206705aecf8995f609213707cab5292480ede3589ff5adb57bd09d230a7761d5cd224906b5ead6b1b7c3dcfe06cf92348e7957
-
SSDEEP
768:fQ2A5Unv1+tybbH3hASLKytbFf9YSOMhi3XPa:Y2A5Unv1+oHHxVKylFf9YSOMAPa
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:7000
Mutex
SfdmUa0k53L7CGBH
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2628-1-0x0000000000E20000-0x0000000000E30000-memory.dmp family_xworm -
Xworm family
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe 2628 XClient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2628 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2628 XClient.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2628
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1752
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:584