Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
XClient14.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient14.exe
Resource
win10v2004-20250217-en
General
-
Target
XClient14.exe
-
Size
502KB
-
MD5
f7e295893a193fa5c78b7fc877b0ac33
-
SHA1
97e368f7de2eed66cd5bcd015e414f1f74168fd5
-
SHA256
2e7a5721bdc47385d6ffea5ad7dee1ea7698df11cd54f704df24b8fcfde5d312
-
SHA512
2d20b86f08aadf594ba126ec6d296f7be4ad60daa6e2872705e746f93b481e1e6cf42d3097f24157b615f73926bbe70cdf85e7bb808e6dff2a17288056482e11
-
SSDEEP
12288:z3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd:TkGTy
Malware Config
Extracted
xworm
5.0
york-beach.gl.at.ply.gg:48693
AatyhInQ27o3OUKx
-
Install_directory
%AppData%
-
install_file
DeadM.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000012102-5.dat family_xworm behavioral1/memory/1784-8-0x0000000000390000-0x00000000003A0000-memory.dmp family_xworm -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2968 created 432 2968 powershell.EXE 5 -
Xworm family
-
Executes dropped EXE 4 IoCs
pid Process 2500 DeadMkhi.exe 1784 DeadMkhi.exe 2724 DeadR.exe 2452 DeadR.exe -
pid Process 2968 powershell.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2968 set thread context of 2784 2968 powershell.EXE 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeadR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeadR.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 30c60be82f90db01 powershell.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2968 powershell.EXE 2968 powershell.EXE 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1784 DeadMkhi.exe Token: SeDebugPrivilege 2500 DeadMkhi.exe Token: SeDebugPrivilege 2968 powershell.EXE Token: SeDebugPrivilege 2968 powershell.EXE Token: SeDebugPrivilege 2784 dllhost.exe Token: SeAuditPrivilege 856 svchost.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2500 1272 XClient14.exe 30 PID 1272 wrote to memory of 2500 1272 XClient14.exe 30 PID 1272 wrote to memory of 2500 1272 XClient14.exe 30 PID 1272 wrote to memory of 1784 1272 XClient14.exe 31 PID 1272 wrote to memory of 1784 1272 XClient14.exe 31 PID 1272 wrote to memory of 1784 1272 XClient14.exe 31 PID 1272 wrote to memory of 2452 1272 XClient14.exe 32 PID 1272 wrote to memory of 2452 1272 XClient14.exe 32 PID 1272 wrote to memory of 2452 1272 XClient14.exe 32 PID 1272 wrote to memory of 2452 1272 XClient14.exe 32 PID 1272 wrote to memory of 2724 1272 XClient14.exe 33 PID 1272 wrote to memory of 2724 1272 XClient14.exe 33 PID 1272 wrote to memory of 2724 1272 XClient14.exe 33 PID 1272 wrote to memory of 2724 1272 XClient14.exe 33 PID 2688 wrote to memory of 2968 2688 taskeng.exe 35 PID 2688 wrote to memory of 2968 2688 taskeng.exe 35 PID 2688 wrote to memory of 2968 2688 taskeng.exe 35 PID 2968 wrote to memory of 2784 2968 powershell.EXE 37 PID 2968 wrote to memory of 2784 2968 powershell.EXE 37 PID 2968 wrote to memory of 2784 2968 powershell.EXE 37 PID 2968 wrote to memory of 2784 2968 powershell.EXE 37 PID 2968 wrote to memory of 2784 2968 powershell.EXE 37 PID 2968 wrote to memory of 2784 2968 powershell.EXE 37 PID 2968 wrote to memory of 2784 2968 powershell.EXE 37 PID 2968 wrote to memory of 2784 2968 powershell.EXE 37 PID 2968 wrote to memory of 2784 2968 powershell.EXE 37 PID 2784 wrote to memory of 432 2784 dllhost.exe 5 PID 2784 wrote to memory of 476 2784 dllhost.exe 6 PID 2784 wrote to memory of 492 2784 dllhost.exe 7 PID 2784 wrote to memory of 500 2784 dllhost.exe 8 PID 2784 wrote to memory of 604 2784 dllhost.exe 9 PID 2784 wrote to memory of 680 2784 dllhost.exe 10 PID 2784 wrote to memory of 752 2784 dllhost.exe 11 PID 2784 wrote to memory of 816 2784 dllhost.exe 12 PID 2784 wrote to memory of 856 2784 dllhost.exe 13 PID 2784 wrote to memory of 984 2784 dllhost.exe 15 PID 2784 wrote to memory of 280 2784 dllhost.exe 16 PID 2784 wrote to memory of 324 2784 dllhost.exe 17 PID 2784 wrote to memory of 1068 2784 dllhost.exe 18 PID 2784 wrote to memory of 1108 2784 dllhost.exe 19 PID 2784 wrote to memory of 1160 2784 dllhost.exe 20 PID 2784 wrote to memory of 1196 2784 dllhost.exe 21 PID 2784 wrote to memory of 2036 2784 dllhost.exe 23 PID 2784 wrote to memory of 864 2784 dllhost.exe 24 PID 2784 wrote to memory of 1572 2784 dllhost.exe 25 PID 2784 wrote to memory of 2348 2784 dllhost.exe 26 PID 2784 wrote to memory of 2244 2784 dllhost.exe 27 PID 2784 wrote to memory of 2500 2784 dllhost.exe 30 PID 2784 wrote to memory of 1784 2784 dllhost.exe 31 PID 2784 wrote to memory of 2688 2784 dllhost.exe 34
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{d6cde177-33ff-4d65-abae-8b7bdee47249}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:2036
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1572
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
PID:752
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1160
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\system32\taskeng.exetaskeng.exe {D666AD11-64B7-4357-AB47-98509453407A} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+'F'+[Char](84)+''+[Char](87)+''+[Char](65)+''+'R'+'E').GetValue(''+'D'+'e'+[Char](97)+''+[Char](100)+''+'s'+''+[Char](116)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:280
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:324
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1068
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:864
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2348
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2244
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:500
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\XClient14.exe"C:\Users\Admin\AppData\Local\Temp\XClient14.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\DeadMkhi.exe"C:\Users\Admin\AppData\Local\Temp\DeadMkhi.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\DeadMkhi.exe"C:\Users\Admin\AppData\Local\Temp\DeadMkhi.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\DeadR.exe"C:\Users\Admin\AppData\Local\Temp\DeadR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\DeadR.exe"C:\Users\Admin\AppData\Local\Temp\DeadR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD538421077d5d28e9b9a4d2ed927c41e77
SHA1ca299eadb3951d9dae97abc506ba3055f4cb8a69
SHA2565327f34d200411695ac0901d86aa5a245e8c3cf2282c3813789b027c5e7010d1
SHA512bb74b86a412d2829085cdbbdc5b9aa3b0ec21b2ea1b7e33bd96aae93fc651785ced3c1ade0d745a90d4a6e6ccd80d3b8b3381795b302cc72388513b20f1cc399
-
Filesize
151KB
MD5b8479a23c22cf6fc456e197939284069
SHA1b2d98cc291f16192a46f363d007e012d45c63300
SHA25618294ee5a6383a48d1bcf2703f17d815529df3a17580e027c3efea1800900e8f
SHA512786cd468ce3723516dc869b09e008ec5d35d1f0c1a61e70083a3be15180866be637bd7d8665c2f0218c56875a0ee597c277e088f77dd403bdd2182d06bad3bd4