Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
PcncisxOpEPwd04.exe
Resource
win7-20241010-en
General
-
Target
PcncisxOpEPwd04.exe
-
Size
1.8MB
-
MD5
cc4fa8e0f981df1ae51a97bf99119152
-
SHA1
ec0eeed8c459332c51564471d3f3888bb31c37ea
-
SHA256
a17b8909af1d89e96eb19201c06ed6d8a04489b965f1456b8307f5d7a31ed43b
-
SHA512
70a9eae974ddc108ece7bd30b35a94656033052da9f3d58d5524966f27068720f17210ac57ee848820b9ef1b60e91aa8eda59a570b7d6e68a6ad2479c78f60c9
-
SSDEEP
49152:+Om3XJnTAo+00ut5gUhIcwxLJPXVN1nZvjxdFntHrpHPJJ5V79DbPJLFZHxnpHNB:+OyBAB00nWg
Malware Config
Extracted
xworm
127.0.0.1:35248
mounsir24-31804.portmap.host:35248
major-europe.gl.at.ply.gg:35248
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3632-16011-0x0000000000400000-0x0000000000418000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4428 powershell.exe 3600 powershell.exe 2296 powershell.exe 2096 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk PcncisxOpEPwd04.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk PcncisxOpEPwd04.exe -
Loads dropped DLL 1 IoCs
pid Process 3632 PcncisxOpEPwd04.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\666999666 = "C:\\Users\\Admin\\AppData\\Roaming\\PcncisxOpEPwd04.exe" PcncisxOpEPwd04.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" PcncisxOpEPwd04.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2136 set thread context of 3632 2136 PcncisxOpEPwd04.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PcncisxOpEPwd04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PcncisxOpEPwd04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4224 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4428 powershell.exe 3600 powershell.exe 2296 powershell.exe 2096 powershell.exe 3632 PcncisxOpEPwd04.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2136 PcncisxOpEPwd04.exe Token: SeDebugPrivilege 3632 PcncisxOpEPwd04.exe Token: SeDebugPrivilege 4428 powershell.exe Token: SeDebugPrivilege 3600 powershell.exe Token: SeDebugPrivilege 2296 powershell.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 3632 PcncisxOpEPwd04.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3632 PcncisxOpEPwd04.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2136 wrote to memory of 3632 2136 PcncisxOpEPwd04.exe 31 PID 2136 wrote to memory of 3632 2136 PcncisxOpEPwd04.exe 31 PID 2136 wrote to memory of 3632 2136 PcncisxOpEPwd04.exe 31 PID 2136 wrote to memory of 3632 2136 PcncisxOpEPwd04.exe 31 PID 2136 wrote to memory of 3632 2136 PcncisxOpEPwd04.exe 31 PID 2136 wrote to memory of 3632 2136 PcncisxOpEPwd04.exe 31 PID 2136 wrote to memory of 3632 2136 PcncisxOpEPwd04.exe 31 PID 2136 wrote to memory of 3632 2136 PcncisxOpEPwd04.exe 31 PID 2136 wrote to memory of 3632 2136 PcncisxOpEPwd04.exe 31 PID 2136 wrote to memory of 1268 2136 PcncisxOpEPwd04.exe 32 PID 2136 wrote to memory of 1268 2136 PcncisxOpEPwd04.exe 32 PID 2136 wrote to memory of 1268 2136 PcncisxOpEPwd04.exe 32 PID 2136 wrote to memory of 1268 2136 PcncisxOpEPwd04.exe 32 PID 1268 wrote to memory of 4224 1268 cmd.exe 34 PID 1268 wrote to memory of 4224 1268 cmd.exe 34 PID 1268 wrote to memory of 4224 1268 cmd.exe 34 PID 1268 wrote to memory of 4224 1268 cmd.exe 34 PID 3632 wrote to memory of 4428 3632 PcncisxOpEPwd04.exe 35 PID 3632 wrote to memory of 4428 3632 PcncisxOpEPwd04.exe 35 PID 3632 wrote to memory of 4428 3632 PcncisxOpEPwd04.exe 35 PID 3632 wrote to memory of 4428 3632 PcncisxOpEPwd04.exe 35 PID 3632 wrote to memory of 3600 3632 PcncisxOpEPwd04.exe 37 PID 3632 wrote to memory of 3600 3632 PcncisxOpEPwd04.exe 37 PID 3632 wrote to memory of 3600 3632 PcncisxOpEPwd04.exe 37 PID 3632 wrote to memory of 3600 3632 PcncisxOpEPwd04.exe 37 PID 3632 wrote to memory of 2296 3632 PcncisxOpEPwd04.exe 39 PID 3632 wrote to memory of 2296 3632 PcncisxOpEPwd04.exe 39 PID 3632 wrote to memory of 2296 3632 PcncisxOpEPwd04.exe 39 PID 3632 wrote to memory of 2296 3632 PcncisxOpEPwd04.exe 39 PID 3632 wrote to memory of 2096 3632 PcncisxOpEPwd04.exe 41 PID 3632 wrote to memory of 2096 3632 PcncisxOpEPwd04.exe 41 PID 3632 wrote to memory of 2096 3632 PcncisxOpEPwd04.exe 41 PID 3632 wrote to memory of 2096 3632 PcncisxOpEPwd04.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe"C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe"C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'PcncisxOpEPwd04.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c timeout /t 1 && DEL /f PcncisxOpEPwd04.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5dabe647ae737145b0505860fb4d569c4
SHA183b8e24710f4a864b4354ec9c6e0cfda7588117a
SHA256f1f9eb4e43f50110402bf9c28c9d4d27dfa92988c40f128a79ed8922628f98dc
SHA512d894c95d29996e58b771df98beac38fb6f9863f329aec5ac99c0b98deae8007ab70f82baff95427ba14dccf3eee2c9af886d241f408853d4e595055171d2fd66
-
Filesize
1.8MB
MD5cc4fa8e0f981df1ae51a97bf99119152
SHA1ec0eeed8c459332c51564471d3f3888bb31c37ea
SHA256a17b8909af1d89e96eb19201c06ed6d8a04489b965f1456b8307f5d7a31ed43b
SHA51270a9eae974ddc108ece7bd30b35a94656033052da9f3d58d5524966f27068720f17210ac57ee848820b9ef1b60e91aa8eda59a570b7d6e68a6ad2479c78f60c9