Analysis
-
max time kernel
879s -
max time network
896s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250218-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250218-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07/03/2025, 21:23
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
XClient.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
XClient.exe
Resource
win10ltsc2021-20250218-en
General
-
Target
XClient.exe
-
Size
30KB
-
MD5
d2c96df3c4b55d087e8da23308dfe54c
-
SHA1
314a2cee1f6906cf28ede2c7abef255149a1b176
-
SHA256
b804b1f09046289284d9c4274a35aea6b17cb9d96639dd6c9301d1a95404bee7
-
SHA512
a2d0c8c061cc072a2e87d4186b6d6b7fc99eb84c8b2ec495089005b1d18c16b8e9161fa8b344b3f8f7fc45df4a06949305cddfcbd53ab34d67946b638ce7bcdd
-
SSDEEP
768:srgECfLH8MYAoR/iw2uBFE9RtOqhhbGi:2gRUiw24FE9RtOqXF
Malware Config
Extracted
xworm
3.1
stay-type.gl.at.ply.gg:46374
ImAt00izybi3Pd3v
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral4/memory/4028-1-0x0000000000800000-0x000000000080E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4028 XClient.exe