Analysis
-
max time kernel
95s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 09:55
Behavioral task
behavioral1
Sample
Excellent3.0.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Excellent3.0.exe
Resource
win10v2004-20250217-en
General
-
Target
Excellent3.0.exe
-
Size
76KB
-
MD5
401131f795244c4e21d3e50f7612f85c
-
SHA1
98b156b8f67b98cd8f4640a0c17d9b85c87cf516
-
SHA256
ac916cba0427c21dede94cb1b3bb061ea7502d865a8964918ea976948b27af48
-
SHA512
5957f631d0a0c99b76fccd000de8f9d3d6084cdfc24d2cfa832045da43eda93b456ecfc2fe3a7457b761a4a698f4cd287a535da144489efc6fd85a6b531ee6e2
-
SSDEEP
1536:1aobhfsGh035rMe4VeC8Tl+bxPBvtzfwl6kJK6vlbYOB7p7Y+k:1aU25rMRVF8B+bDvSNkylcOB71Y+k
Malware Config
Extracted
xworm
used-billion.gl.at.ply.gg:43161
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4764-1-0x0000000000F10000-0x0000000000F2A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 6080 powershell.exe 2148 powershell.exe 5080 powershell.exe 2088 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation Excellent3.0.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Excellent3.0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Excellent3.0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" Excellent3.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 6080 powershell.exe 6080 powershell.exe 2148 powershell.exe 2148 powershell.exe 5080 powershell.exe 5080 powershell.exe 2088 powershell.exe 2088 powershell.exe 4764 Excellent3.0.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4764 Excellent3.0.exe Token: SeDebugPrivilege 6080 powershell.exe Token: SeDebugPrivilege 2148 powershell.exe Token: SeDebugPrivilege 5080 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 4764 Excellent3.0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4764 Excellent3.0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4764 wrote to memory of 6080 4764 Excellent3.0.exe 94 PID 4764 wrote to memory of 6080 4764 Excellent3.0.exe 94 PID 4764 wrote to memory of 2148 4764 Excellent3.0.exe 96 PID 4764 wrote to memory of 2148 4764 Excellent3.0.exe 96 PID 4764 wrote to memory of 5080 4764 Excellent3.0.exe 98 PID 4764 wrote to memory of 5080 4764 Excellent3.0.exe 98 PID 4764 wrote to memory of 2088 4764 Excellent3.0.exe 100 PID 4764 wrote to memory of 2088 4764 Excellent3.0.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Excellent3.0.exe"C:\Users\Admin\AppData\Local\Temp\Excellent3.0.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Excellent3.0.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6080
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Excellent3.0.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a43e653ffb5ab07940f4bdd9cc8fade4
SHA1af43d04e3427f111b22dc891c5c7ee8a10ac4123
SHA256c4c53abb13e99475aebfbe9fec7a8fead81c14c80d9dcc2b81375304f3a683fe
SHA51262a97e95e1f19a8d4302847110dae44f469877eed6aa8ea22345c6eb25ee220e7d310fa0b7ec5df42356815421c0af7c46a0f1fee8933cc446641800eda6cd1b
-
Filesize
944B
MD576692775e4781f0c9f0092f5804cfdb1
SHA16740e4e4110028c62282ee1e7eb8be576a2bc23a
SHA2560c451ff3823450d544066237cbfb08556b7ca36c4a0ea085055f69ab35795b00
SHA5126e0731e3736594d9e86da2fc33e08a663f29100074cc8d46e2716123c946b9eb150c804c7cf8428cac631e1cff984663d41ce3b5e1e77965bd8e2ecf0742af34
-
Filesize
944B
MD584a57d62cb0de58cf0d7e48560a37a14
SHA12dc80f746048d04d7f56649bd466b905d61e130e
SHA256948316416d57e501b97e8670be33bf698484090e2c6fd595d318dab8fae6e54d
SHA51200551a319a19b635b65f0020441e280b1098036b3f6cbb05a7d550728efaf0775844f838e701cfff3933cc84c1cb1bf440df4bde56f24f75d244b7d9a9f79ddd
-
Filesize
944B
MD59c740b7699e2363ac4ecdf496520ca35
SHA1aa8691a8c56500d82c5fc8c35209bc6fe50ab1d9
SHA256be96c91b62ba9ba7072ab89e66543328c9e4395150f9dbe8067332d94a3ecc61
SHA5128885683f96353582eb871209e766e7eba1a72a2837ce27ea298b7b5b169621d1fa3fce25346b6bfd258b52642644234da9559d4e765a2023a5a5fc1f544cc7af
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82