Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 23:56

General

  • Target

    XClient.exe

  • Size

    34KB

  • MD5

    606d9b179157736ea5acad71ad50c0c7

  • SHA1

    dd88b6e09b9be71fe98ee1fa76c5f14f5e9ef84c

  • SHA256

    80a2ae9b77c4eafc3da22fac6025b340793c2bdbfef7b061cdc88bdea330e11a

  • SHA512

    c81d9e0e6f28869f6618c2904d317eb113514db2685621c674c0697e76c187249fd50a365cf07f6972c2a43970b4081e470a18dc631ca74cd1f606307fcdd2c7

  • SSDEEP

    768:OtH6rNd7AtFPNhzIgtoFk9Fy9Yx/Ojhe/Vcg:OtuNJyF0gtowFy9Yx/OjItcg

Malware Config

Extracted

Family

xworm

Version

5.0

C2

MellowFishy-29478.portmap.host:29478

Mutex

k1tzVGcrL1gP53ej

Attributes
  • Install_directory

    %AppData%

  • install_file

    Realtek Audio Driver.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA812.tmp.bat""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpA812.tmp.bat

    Filesize

    159B

    MD5

    0d14a371b0e7dfe5cc7b84cd7fb89481

    SHA1

    d7b05cc061768729a20b556308b2be1d510babc0

    SHA256

    459a1cc2830db9476b083c579f7db4f005763388e2e428c288ad154cc4ae7eea

    SHA512

    cb0a9d201d2541fd8246b290cb4b308787519f49909c7d1c2ca5a518d0ba06b79697f895ec011be27b8f15e8f22026fd49f073d4f2c594a2d3e1df76e8006a69

  • memory/1420-0-0x000007FEF5C53000-0x000007FEF5C54000-memory.dmp

    Filesize

    4KB

  • memory/1420-1-0x00000000003F0000-0x00000000003FE000-memory.dmp

    Filesize

    56KB

  • memory/1420-6-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB

  • memory/1420-7-0x000007FEF5C53000-0x000007FEF5C54000-memory.dmp

    Filesize

    4KB

  • memory/1420-8-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB

  • memory/1420-20-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

    Filesize

    9.9MB