Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 17:27
General
-
Target
XClient.exe
-
Size
82KB
-
MD5
d1204a713d2783ed15f21d05d36382b3
-
SHA1
3894a3e7357f1b1fca20f17834dc9ac3a448915b
-
SHA256
fc49309c85d3e0d4251f388411e3619dbbe8b3207f4c51b28ed258e63c38ac30
-
SHA512
d5fd18f6f2915e908555891dddf5e373244181ba45ee146f172c638df538551126a026d618779eeeb5785b8f6c40f2cc88446267a8145128b4d3de75c75709b6
-
SSDEEP
1536:/sGUFLw3NUPi9BbuRi2Hkjq/x6S1Opv7+bkw:/iJw3LBbuRxHk2F1Oh7+Yw
Malware Config
Extracted
xworm
editor-monitoring.gl.at.ply.gg:35972
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3436-1-0x00000000009A0000-0x00000000009BA000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 2032 msedge.exe 2032 msedge.exe 3872 msedge.exe 3872 msedge.exe 1820 identity_helper.exe 1820 identity_helper.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3436 XClient.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2380 2032 msedge.exe 85 PID 2032 wrote to memory of 2380 2032 msedge.exe 85 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 1856 2032 msedge.exe 86 PID 2032 wrote to memory of 3496 2032 msedge.exe 87 PID 2032 wrote to memory of 3496 2032 msedge.exe 87 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88 PID 2032 wrote to memory of 3116 2032 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc351e3cb8,0x7ffc351e3cc8,0x7ffc351e3cd82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,641873382069172873,15116637073655105332,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD546ec2d399c9d10a0545cb514e47de14e
SHA198fc6f3f34f4082b8d81cc50dc571ec06eb454ca
SHA256f50fff32b15e4b61c3cb18655c3daf46a83556aef1f3ff8d9ed074f298f247a5
SHA512993b723da7b0ffcaa731a1f06057bf2ebdc2fd518ef8765b4f625b9fd0094cc6abdccfe998d0e6cb760a3e5d6c411b197a47e67c1de5a6ec4315d017a552a2be
-
Filesize
152B
MD5a1ea058d6231b47f5bb8557adba13351
SHA1111dbb6ffff6517e11719a20683fd7f4ef0579d2
SHA256f5a91a0770c54a1601557b8babfcc7813972275da171c384cc8929d2910a851f
SHA512e613f481c50b5a7022a763d13ac1b1ebb6a9d4d973de95108d95d23844d9d526d8c90f391493f043e86e22e9a5abd8a3a4cab5f2def248033d0eb9421091889b
-
Filesize
5KB
MD5651fbc0b74f595fa23a70e71dd950958
SHA1dc58a65591042cbbd1a9a24bda97375f9b454c99
SHA256c54b3808ebcfb2ed56620250f93ea21d0223e68cb4a0093f3361b04c0cc5798a
SHA512f08b7e732ccafa6097361bec1959ad0931bfcaa26841465d831ed4521b46d0be9fc82786b0c5947d457f54ce764f1cbb644650e4a5dd4e74a6b08a65df4679d5
-
Filesize
5KB
MD59ced5a74b0bab93486a9e6aa3bb9c23b
SHA1397a54edbb4555fe816e13624aab3850a68220fb
SHA256ee4eaf312574bdf8574a949f5c641c4da177333c39f669ce852b6d78d6d2e475
SHA51287c2ed2cfcf8a177916ccaed9881d2652721dc39025b62c7db41b49b7ae57b04961581c504900b20c401892bc66ddbe49d0045a22e4d41609cbc9d09372d48c4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD52a8e293a4c1908f5aa4871b838833f55
SHA10bc41afa62b47c4fe5e217f1bff9eb999544b299
SHA25699940900a9938d464179c19ccb453c70978b408f4e65db4824a525c73d38bbfd
SHA5129b6d4ac4045eeaa5adcf02e59bd0d5b77f1c767e85545d28467cc521a81d64307cdd21135bb45b763ea8b521e6749abd916a9b13110040f80c82c75344c65e13