Resubmissions
06/03/2025, 14:20
250306-rntphszxdy 1006/03/2025, 14:17
250306-rl1eaa1ly5 1006/03/2025, 14:12
250306-rja2ls1ls4 1006/03/2025, 14:02
250306-rb7eva1jz2 10Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 14:17
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20250217-en
General
-
Target
XClient.exe
-
Size
34KB
-
MD5
420aaab8a4e68d5730a9e19422a0fe96
-
SHA1
f4dd350f797169f22c8efd7de8a252b7d2fcf8ae
-
SHA256
d65824b6d2c191eb48d040261d408ecb3f1d0cf6ef9ceac096543b184582aded
-
SHA512
fa1ccd03397231387559381aa7762e786b98fa89c02a8b09b6804a14ed0a3ce45ba11bb6b5f7a112a2420a3bd25f708f2ebc4afb281c377dc372fca563e63f98
-
SSDEEP
768:0e749/qEkLACVVickCVFy19JZ6aO/hoq/:XaCEk8hcdF49JZ6aO/CQ
Malware Config
Extracted
xworm
3.1
association-lectures.gl.at.ply.gg:32463
Gpg1PP1lxuWY9X4X
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 19 IoCs
resource yara_rule behavioral1/memory/2016-1-0x00000000000A0000-0x00000000000AE000-memory.dmp family_xworm behavioral1/files/0x000e000000015cd1-27.dat family_xworm behavioral1/memory/2016-30-0x0000000000170000-0x00000000001F0000-memory.dmp family_xworm behavioral1/memory/2360-34-0x0000000000380000-0x000000000038E000-memory.dmp family_xworm behavioral1/files/0x0004000000004ed7-40.dat family_xworm behavioral1/memory/1672-42-0x00000000013D0000-0x00000000013DE000-memory.dmp family_xworm behavioral1/memory/2272-60-0x0000000000210000-0x000000000021E000-memory.dmp family_xworm behavioral1/memory/1028-78-0x0000000000DB0000-0x0000000000DBE000-memory.dmp family_xworm behavioral1/memory/2108-84-0x00000000011E0000-0x00000000011EE000-memory.dmp family_xworm behavioral1/memory/1612-85-0x0000000000D10000-0x0000000000D1E000-memory.dmp family_xworm behavioral1/memory/2800-92-0x0000000000320000-0x000000000032E000-memory.dmp family_xworm behavioral1/memory/1064-97-0x0000000000EB0000-0x0000000000EBE000-memory.dmp family_xworm behavioral1/memory/2996-104-0x0000000000BD0000-0x0000000000BDE000-memory.dmp family_xworm behavioral1/memory/1788-109-0x00000000012D0000-0x00000000012DE000-memory.dmp family_xworm behavioral1/memory/2080-117-0x00000000002B0000-0x00000000002BE000-memory.dmp family_xworm behavioral1/memory/1748-122-0x0000000000190000-0x000000000019E000-memory.dmp family_xworm behavioral1/memory/1520-129-0x0000000000930000-0x000000000093E000-memory.dmp family_xworm behavioral1/memory/3008-134-0x0000000000E80000-0x0000000000E8E000-memory.dmp family_xworm behavioral1/memory/2668-137-0x00000000003E0000-0x00000000003EE000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2604 powershell.exe 2876 powershell.exe 2992 powershell.exe 1708 powershell.exe 2284 powershell.exe 912 powershell.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\appbfi.lnk appbfi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\appbfi.lnk appbfi.exe -
Executes dropped EXE 16 IoCs
pid Process 2360 XClient.exe 1672 appbfi.exe 2272 jxhboc.exe 1028 rcugpj.exe 2108 appbfi.exe 1612 XClient.exe 2800 qwkivr.exe 1064 zrvdim.exe 2996 svslyw.exe 1788 azptrq.exe 2080 mrjqca.exe 1748 jyhuwk.exe 1520 vcwfox.exe 3008 dwopgh.exe 1988 appbfi.exe 2668 XClient.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\appbfi = "C:\\Users\\Admin\\AppData\\Roaming\\appbfi.exe" appbfi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe 576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2604 powershell.exe 2876 powershell.exe 2992 powershell.exe 1708 powershell.exe 2284 powershell.exe 912 powershell.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2016 XClient.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2992 powershell.exe Token: SeDebugPrivilege 2016 XClient.exe Token: SeDebugPrivilege 2360 XClient.exe Token: SeDebugPrivilege 1672 appbfi.exe Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 2272 jxhboc.exe Token: SeDebugPrivilege 912 powershell.exe Token: SeDebugPrivilege 1672 appbfi.exe Token: SeDebugPrivilege 1028 rcugpj.exe Token: SeDebugPrivilege 2108 appbfi.exe Token: SeDebugPrivilege 1612 XClient.exe Token: SeDebugPrivilege 2800 qwkivr.exe Token: SeDebugPrivilege 1064 zrvdim.exe Token: SeDebugPrivilege 2996 svslyw.exe Token: SeDebugPrivilege 1788 azptrq.exe Token: SeDebugPrivilege 2080 mrjqca.exe Token: SeDebugPrivilege 1748 jyhuwk.exe Token: SeDebugPrivilege 1520 vcwfox.exe Token: SeDebugPrivilege 3008 dwopgh.exe Token: SeDebugPrivilege 1988 appbfi.exe Token: SeDebugPrivilege 2668 XClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2604 2016 XClient.exe 30 PID 2016 wrote to memory of 2604 2016 XClient.exe 30 PID 2016 wrote to memory of 2604 2016 XClient.exe 30 PID 2016 wrote to memory of 2876 2016 XClient.exe 32 PID 2016 wrote to memory of 2876 2016 XClient.exe 32 PID 2016 wrote to memory of 2876 2016 XClient.exe 32 PID 2016 wrote to memory of 2992 2016 XClient.exe 34 PID 2016 wrote to memory of 2992 2016 XClient.exe 34 PID 2016 wrote to memory of 2992 2016 XClient.exe 34 PID 2016 wrote to memory of 2712 2016 XClient.exe 37 PID 2016 wrote to memory of 2712 2016 XClient.exe 37 PID 2016 wrote to memory of 2712 2016 XClient.exe 37 PID 2368 wrote to memory of 2360 2368 taskeng.exe 40 PID 2368 wrote to memory of 2360 2368 taskeng.exe 40 PID 2368 wrote to memory of 2360 2368 taskeng.exe 40 PID 2016 wrote to memory of 1672 2016 XClient.exe 42 PID 2016 wrote to memory of 1672 2016 XClient.exe 42 PID 2016 wrote to memory of 1672 2016 XClient.exe 42 PID 1672 wrote to memory of 1708 1672 appbfi.exe 43 PID 1672 wrote to memory of 1708 1672 appbfi.exe 43 PID 1672 wrote to memory of 1708 1672 appbfi.exe 43 PID 1672 wrote to memory of 2284 1672 appbfi.exe 45 PID 1672 wrote to memory of 2284 1672 appbfi.exe 45 PID 1672 wrote to memory of 2284 1672 appbfi.exe 45 PID 1672 wrote to memory of 912 1672 appbfi.exe 47 PID 1672 wrote to memory of 912 1672 appbfi.exe 47 PID 1672 wrote to memory of 912 1672 appbfi.exe 47 PID 2016 wrote to memory of 2272 2016 XClient.exe 49 PID 2016 wrote to memory of 2272 2016 XClient.exe 49 PID 2016 wrote to memory of 2272 2016 XClient.exe 49 PID 1672 wrote to memory of 576 1672 appbfi.exe 50 PID 1672 wrote to memory of 576 1672 appbfi.exe 50 PID 1672 wrote to memory of 576 1672 appbfi.exe 50 PID 2016 wrote to memory of 1028 2016 XClient.exe 52 PID 2016 wrote to memory of 1028 2016 XClient.exe 52 PID 2016 wrote to memory of 1028 2016 XClient.exe 52 PID 2368 wrote to memory of 1612 2368 taskeng.exe 54 PID 2368 wrote to memory of 1612 2368 taskeng.exe 54 PID 2368 wrote to memory of 1612 2368 taskeng.exe 54 PID 2368 wrote to memory of 2108 2368 taskeng.exe 53 PID 2368 wrote to memory of 2108 2368 taskeng.exe 53 PID 2368 wrote to memory of 2108 2368 taskeng.exe 53 PID 2016 wrote to memory of 2800 2016 XClient.exe 55 PID 2016 wrote to memory of 2800 2016 XClient.exe 55 PID 2016 wrote to memory of 2800 2016 XClient.exe 55 PID 1672 wrote to memory of 1064 1672 appbfi.exe 56 PID 1672 wrote to memory of 1064 1672 appbfi.exe 56 PID 1672 wrote to memory of 1064 1672 appbfi.exe 56 PID 1672 wrote to memory of 2996 1672 appbfi.exe 57 PID 1672 wrote to memory of 2996 1672 appbfi.exe 57 PID 1672 wrote to memory of 2996 1672 appbfi.exe 57 PID 2016 wrote to memory of 1788 2016 XClient.exe 58 PID 2016 wrote to memory of 1788 2016 XClient.exe 58 PID 2016 wrote to memory of 1788 2016 XClient.exe 58 PID 1672 wrote to memory of 2080 1672 appbfi.exe 59 PID 1672 wrote to memory of 2080 1672 appbfi.exe 59 PID 1672 wrote to memory of 2080 1672 appbfi.exe 59 PID 2016 wrote to memory of 1748 2016 XClient.exe 60 PID 2016 wrote to memory of 1748 2016 XClient.exe 60 PID 2016 wrote to memory of 1748 2016 XClient.exe 60 PID 1672 wrote to memory of 1520 1672 appbfi.exe 61 PID 1672 wrote to memory of 1520 1672 appbfi.exe 61 PID 1672 wrote to memory of 1520 1672 appbfi.exe 61 PID 2016 wrote to memory of 3008 2016 XClient.exe 62 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\appbfi.exe"C:\Users\Admin\AppData\Local\Temp\appbfi.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\appbfi.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'appbfi.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\appbfi.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "appbfi" /tr "C:\Users\Admin\AppData\Roaming\appbfi.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\zrvdim.exe"C:\Users\Admin\AppData\Local\Temp\zrvdim.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\svslyw.exe"C:\Users\Admin\AppData\Local\Temp\svslyw.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\mrjqca.exe"C:\Users\Admin\AppData\Local\Temp\mrjqca.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\vcwfox.exe"C:\Users\Admin\AppData\Local\Temp\vcwfox.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
-
C:\Users\Admin\AppData\Local\Temp\jxhboc.exe"C:\Users\Admin\AppData\Local\Temp\jxhboc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\rcugpj.exe"C:\Users\Admin\AppData\Local\Temp\rcugpj.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\qwkivr.exe"C:\Users\Admin\AppData\Local\Temp\qwkivr.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\azptrq.exe"C:\Users\Admin\AppData\Local\Temp\azptrq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\jyhuwk.exe"C:\Users\Admin\AppData\Local\Temp\jyhuwk.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\dwopgh.exe"C:\Users\Admin\AppData\Local\Temp\dwopgh.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {DA512B72-B72D-4DCF-9CD4-79EB10666A87} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Users\Admin\AppData\Roaming\appbfi.exeC:\Users\Admin\AppData\Roaming\appbfi.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Users\Admin\AppData\Roaming\appbfi.exeC:\Users\Admin\AppData\Roaming\appbfi.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5950d739da650457fab6a225545794238
SHA1e965286161ecda1b8c0072d8a2d80c191bb15705
SHA256a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8
SHA512b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD582edd53de3aa9c79fad9a8e4f52b6978
SHA12977376e1dd3f0a9ffde153913983b45aa72b97f
SHA2564e5accdd29726b5abe9c304c2bfedb988965cc399bfb8242e8ce337bccfd38ac
SHA512a8218936b2be33059d2a0e37b343bc7ff3921a8075ccb6c7f8bc268e4dac1ec89d54b62c9587b629c928a5d1bb56311c3cf76d6dc4c64cf41806cfc220a70092
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d0d562c211f3b31fe14fadef3a3e91f9
SHA1016a57d2edd192a8e0db0c52d4890cbc6f235a63
SHA256335df1446779bc24c14aeb7961672eaf04bc1a198c19b26a6ae64b9f082a85ab
SHA5122a6fc53d72a46df1bed4ad0cbeaf08b61acee32b771e36dd2190d3a7f5c521c2fae43b6072fad2f6edb55424234a48db57417a825aea56d67accbb2d1fccd8b2
-
Filesize
34KB
MD5420aaab8a4e68d5730a9e19422a0fe96
SHA1f4dd350f797169f22c8efd7de8a252b7d2fcf8ae
SHA256d65824b6d2c191eb48d040261d408ecb3f1d0cf6ef9ceac096543b184582aded
SHA512fa1ccd03397231387559381aa7762e786b98fa89c02a8b09b6804a14ed0a3ce45ba11bb6b5f7a112a2420a3bd25f708f2ebc4afb281c377dc372fca563e63f98