Analysis
-
max time kernel
889s -
max time network
898s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/03/2025, 21:23
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
XClient.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
XClient.exe
Resource
win10ltsc2021-20250218-en
General
-
Target
XClient.exe
-
Size
30KB
-
MD5
d2c96df3c4b55d087e8da23308dfe54c
-
SHA1
314a2cee1f6906cf28ede2c7abef255149a1b176
-
SHA256
b804b1f09046289284d9c4274a35aea6b17cb9d96639dd6c9301d1a95404bee7
-
SHA512
a2d0c8c061cc072a2e87d4186b6d6b7fc99eb84c8b2ec495089005b1d18c16b8e9161fa8b344b3f8f7fc45df4a06949305cddfcbd53ab34d67946b638ce7bcdd
-
SSDEEP
768:srgECfLH8MYAoR/iw2uBFE9RtOqhhbGi:2gRUiw24FE9RtOqXF
Malware Config
Extracted
xworm
3.1
stay-type.gl.at.ply.gg:46374
ImAt00izybi3Pd3v
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral5/memory/3784-1-0x0000000000A20000-0x0000000000A2E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3784 XClient.exe