Analysis
-
max time kernel
119s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
PcncisxOpEPwd04.exe
Resource
win7-20250207-en
General
-
Target
PcncisxOpEPwd04.exe
-
Size
1.8MB
-
MD5
cc4fa8e0f981df1ae51a97bf99119152
-
SHA1
ec0eeed8c459332c51564471d3f3888bb31c37ea
-
SHA256
a17b8909af1d89e96eb19201c06ed6d8a04489b965f1456b8307f5d7a31ed43b
-
SHA512
70a9eae974ddc108ece7bd30b35a94656033052da9f3d58d5524966f27068720f17210ac57ee848820b9ef1b60e91aa8eda59a570b7d6e68a6ad2479c78f60c9
-
SSDEEP
49152:+Om3XJnTAo+00ut5gUhIcwxLJPXVN1nZvjxdFntHrpHPJJ5V79DbPJLFZHxnpHNB:+OyBAB00nWg
Malware Config
Extracted
xworm
127.0.0.1:35248
mounsir24-31804.portmap.host:35248
major-europe.gl.at.ply.gg:35248
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/8856-16012-0x0000000000400000-0x0000000000418000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2632 powershell.exe 9020 powershell.exe 9104 powershell.exe 9188 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk PcncisxOpEPwd04.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk PcncisxOpEPwd04.exe -
Loads dropped DLL 1 IoCs
pid Process 8856 PcncisxOpEPwd04.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\666999666 = "C:\\Users\\Admin\\AppData\\Local\\PcncisxOpEPwd04.exe" PcncisxOpEPwd04.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" PcncisxOpEPwd04.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2364 set thread context of 8856 2364 PcncisxOpEPwd04.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PcncisxOpEPwd04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PcncisxOpEPwd04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 8964 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 9020 powershell.exe 9104 powershell.exe 9188 powershell.exe 2632 powershell.exe 8856 PcncisxOpEPwd04.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2364 PcncisxOpEPwd04.exe Token: SeDebugPrivilege 8856 PcncisxOpEPwd04.exe Token: SeDebugPrivilege 9020 powershell.exe Token: SeDebugPrivilege 9104 powershell.exe Token: SeDebugPrivilege 9188 powershell.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 8856 PcncisxOpEPwd04.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 8856 PcncisxOpEPwd04.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2364 wrote to memory of 8856 2364 PcncisxOpEPwd04.exe 30 PID 2364 wrote to memory of 8856 2364 PcncisxOpEPwd04.exe 30 PID 2364 wrote to memory of 8856 2364 PcncisxOpEPwd04.exe 30 PID 2364 wrote to memory of 8856 2364 PcncisxOpEPwd04.exe 30 PID 2364 wrote to memory of 8856 2364 PcncisxOpEPwd04.exe 30 PID 2364 wrote to memory of 8856 2364 PcncisxOpEPwd04.exe 30 PID 2364 wrote to memory of 8856 2364 PcncisxOpEPwd04.exe 30 PID 2364 wrote to memory of 8856 2364 PcncisxOpEPwd04.exe 30 PID 2364 wrote to memory of 8856 2364 PcncisxOpEPwd04.exe 30 PID 2364 wrote to memory of 8916 2364 PcncisxOpEPwd04.exe 31 PID 2364 wrote to memory of 8916 2364 PcncisxOpEPwd04.exe 31 PID 2364 wrote to memory of 8916 2364 PcncisxOpEPwd04.exe 31 PID 2364 wrote to memory of 8916 2364 PcncisxOpEPwd04.exe 31 PID 8916 wrote to memory of 8964 8916 cmd.exe 33 PID 8916 wrote to memory of 8964 8916 cmd.exe 33 PID 8916 wrote to memory of 8964 8916 cmd.exe 33 PID 8916 wrote to memory of 8964 8916 cmd.exe 33 PID 8856 wrote to memory of 9020 8856 PcncisxOpEPwd04.exe 34 PID 8856 wrote to memory of 9020 8856 PcncisxOpEPwd04.exe 34 PID 8856 wrote to memory of 9020 8856 PcncisxOpEPwd04.exe 34 PID 8856 wrote to memory of 9020 8856 PcncisxOpEPwd04.exe 34 PID 8856 wrote to memory of 9104 8856 PcncisxOpEPwd04.exe 36 PID 8856 wrote to memory of 9104 8856 PcncisxOpEPwd04.exe 36 PID 8856 wrote to memory of 9104 8856 PcncisxOpEPwd04.exe 36 PID 8856 wrote to memory of 9104 8856 PcncisxOpEPwd04.exe 36 PID 8856 wrote to memory of 9188 8856 PcncisxOpEPwd04.exe 38 PID 8856 wrote to memory of 9188 8856 PcncisxOpEPwd04.exe 38 PID 8856 wrote to memory of 9188 8856 PcncisxOpEPwd04.exe 38 PID 8856 wrote to memory of 9188 8856 PcncisxOpEPwd04.exe 38 PID 8856 wrote to memory of 2632 8856 PcncisxOpEPwd04.exe 40 PID 8856 wrote to memory of 2632 8856 PcncisxOpEPwd04.exe 40 PID 8856 wrote to memory of 2632 8856 PcncisxOpEPwd04.exe 40 PID 8856 wrote to memory of 2632 8856 PcncisxOpEPwd04.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe"C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe"C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:8856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\PcncisxOpEPwd04.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9020
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'PcncisxOpEPwd04.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9104
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9188
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c timeout /t 1 && DEL /f PcncisxOpEPwd04.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8916 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:8964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5728944edf1c4dd5f84dc1396ba08bab9
SHA104834b0647d86d7f3a86ba09bf3837392efff4eb
SHA25630174f4cf072230f61219d9116d92e395b0eafb5109a0dce484f2da3a34b48c7
SHA5120b4314a4b298ce26ed2476fd2d13336071e21d7475daa139eeae3685bbfde44cefeb827ed75e14461e5b5a6e238b71e52e74ba7bcef07c8b1672d7da897aa266
-
Filesize
1.8MB
MD5cc4fa8e0f981df1ae51a97bf99119152
SHA1ec0eeed8c459332c51564471d3f3888bb31c37ea
SHA256a17b8909af1d89e96eb19201c06ed6d8a04489b965f1456b8307f5d7a31ed43b
SHA51270a9eae974ddc108ece7bd30b35a94656033052da9f3d58d5524966f27068720f17210ac57ee848820b9ef1b60e91aa8eda59a570b7d6e68a6ad2479c78f60c9