Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 14:48
Errors
General
-
Target
XClient.exe
-
Size
197KB
-
MD5
947531e390d56a33db1c5fac201f3d6e
-
SHA1
6890af0bf097ca3dbf3a979251e8e9655a0d28c9
-
SHA256
e98dc3272849a4feef91b79b5f4ceb5a5caeeb67c0ace7b951e719e4c56dc4b9
-
SHA512
36c81a7b5ad59952e0e084df7601e14e2f4ac5530dd2937ab90f7f7693297f9776f6e970905f35cf058b76d5c3a465a112276d6426fe6527b8596504292df3e0
-
SSDEEP
3072:Qd9KkHFE9jNOjn8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLnK:QrE92UhcX7elbKTuq9bfF/H9d9n
Malware Config
Extracted
xworm
5.0
ohsorry-20836.portmap.host:20836
p0RlYlnzEbgzdE3a
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/912-1-0x0000000000690000-0x00000000006C6000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 3896 enyltc.exe 3180 xxrnpg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language enyltc.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "145" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 912 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2568 LogonUI.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 912 wrote to memory of 3896 912 XClient.exe 83 PID 912 wrote to memory of 3896 912 XClient.exe 83 PID 912 wrote to memory of 3896 912 XClient.exe 83 PID 912 wrote to memory of 3180 912 XClient.exe 87 PID 912 wrote to memory of 3180 912 XClient.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\enyltc.exe"C:\Users\Admin\AppData\Local\Temp\enyltc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\xxrnpg.exe"C:\Users\Admin\AppData\Local\Temp\xxrnpg.exe"2⤵
- Executes dropped EXE
PID:3180
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a2d855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5d0a314fbbc8e3932366190b80d3a1d43
SHA19f5acdce5c4be66bce4d36d30dc0cc28cc607269
SHA256b59b98e49c5a393691d1766623992d7b998b61a4f4420769c1431963146fdf6b
SHA51215cda90b5bcd668b28a165cd83a165cb709b76cfcca21bd7918f6693022f93bafcb930dbbc8504c1ec9f47baa828ae47c58cf38b04ac1ec83911d126fe443d64
-
Filesize
10KB
MD5424755b9f13cdb742d503836bf09e63e
SHA1b4cdc234fdca58519edf14fa3b0bb3a522249440
SHA256e0e95c4be30bc2199018c4a44b4df874ee991665d0aff048e39b1c905cc9da56
SHA51229dd79ca6d2e451da0b0597c1d6b4cd860a8641438f139dcd3ecc02ecd0a638feb28e41b2088fc2e360b27f5c343b1843889686070307bdb26077593791972b7