Overview
overview
10Static
static
10cd94462486...32.exe
windows7-x64
10cd94462486...32.exe
windows10-2004-x64
10cdb97c07f0...ca.exe
windows7-x64
1cdb97c07f0...ca.exe
windows10-2004-x64
1cdfbee96df...25.exe
windows7-x64
10cdfbee96df...25.exe
windows10-2004-x64
10ce01fc8942...b5.exe
windows7-x64
10ce01fc8942...b5.exe
windows10-2004-x64
10ce5340f773...6e.exe
windows7-x64
10ce5340f773...6e.exe
windows10-2004-x64
10ce6d4255fc...f1.exe
windows7-x64
10ce6d4255fc...f1.exe
windows10-2004-x64
10ce8f0a3c5b...fc.exe
windows7-x64
8ce8f0a3c5b...fc.exe
windows10-2004-x64
8cef4f0409d...db.exe
windows7-x64
10cef4f0409d...db.exe
windows10-2004-x64
10cf15609eab...81.exe
windows7-x64
9cf15609eab...81.exe
windows10-2004-x64
9cf3f6f6285...6e.exe
windows7-x64
10cf3f6f6285...6e.exe
windows10-2004-x64
10cf450b1869...e9.exe
windows7-x64
10cf450b1869...e9.exe
windows10-2004-x64
10cf56059ae5...a1.exe
windows7-x64
10cf56059ae5...a1.exe
windows10-2004-x64
10cf79ab31cc...04.exe
windows7-x64
10cf79ab31cc...04.exe
windows10-2004-x64
10cf8d6b1a05...68.exe
windows7-x64
10cf8d6b1a05...68.exe
windows10-2004-x64
10cf96c893c9...10.exe
windows7-x64
1cf96c893c9...10.exe
windows10-2004-x64
1cfd31bf82d...9b.exe
windows7-x64
7cfd31bf82d...9b.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:16
Behavioral task
behavioral1
Sample
cd94462486ad6fad4ab587ad00762632.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cd94462486ad6fad4ab587ad00762632.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
cdb97c07f0cbc499f78b386b2d398952a930a2715698d9b3589a5f4bb87ae2ca.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
cdb97c07f0cbc499f78b386b2d398952a930a2715698d9b3589a5f4bb87ae2ca.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
cdfbee96df9f657c44ea8ed17e90e025.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
cdfbee96df9f657c44ea8ed17e90e025.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
ce01fc8942b621016741e3fd96b711a32c6375ebea07247fab8b310c8b744ab5.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
ce01fc8942b621016741e3fd96b711a32c6375ebea07247fab8b310c8b744ab5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
ce5340f77345fe52a889a5f1543f19e4764b86984973180a8fae158fa960576e.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ce5340f77345fe52a889a5f1543f19e4764b86984973180a8fae158fa960576e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
ce6d4255fc2065eaebf1bb640bffbef1.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ce6d4255fc2065eaebf1bb640bffbef1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
ce8f0a3c5b1faff7d414fc5d91588fa50e2806b342d348092d545ebc0a752bfc.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
ce8f0a3c5b1faff7d414fc5d91588fa50e2806b342d348092d545ebc0a752bfc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
cf15609eaba6912ae9b6d7d424c25519f4a8ff30c550a599b00e2ec79d310681.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
cf15609eaba6912ae9b6d7d424c25519f4a8ff30c550a599b00e2ec79d310681.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
cf3f6f628505c197d6909686370e5f6e.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
cf3f6f628505c197d6909686370e5f6e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
cf450b1869e9064758b27a7df84b5117a9bdc5e448a47f5170904649fa7fefe9.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
cf450b1869e9064758b27a7df84b5117a9bdc5e448a47f5170904649fa7fefe9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
cf56059ae5d477487f8605c5301ceca1.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
cf56059ae5d477487f8605c5301ceca1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
cf79ab31cc7f483d3b8572ef14b47804.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
cf79ab31cc7f483d3b8572ef14b47804.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
cf8d6b1a05c4369c93e7cfd13bf472ffd3ca8206e8ea41e132069d5c485a2a68.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
cf8d6b1a05c4369c93e7cfd13bf472ffd3ca8206e8ea41e132069d5c485a2a68.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral29
Sample
cf96c893c9bc9bb1f6bbf4d1e00c0910.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
cf96c893c9bc9bb1f6bbf4d1e00c0910.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
cfd31bf82d7172bd87616d4d9310518d54d29699e851d81df254138d7e29859b.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
cfd31bf82d7172bd87616d4d9310518d54d29699e851d81df254138d7e29859b.exe
Resource
win10v2004-20250314-en
General
-
Target
cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe
-
Size
707KB
-
MD5
96c50f871ceb7ee1a0b41dcca8da5c01
-
SHA1
d8946f0af6156c6f69895a2808734d2696660ada
-
SHA256
cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db
-
SHA512
0ac872561e55a4c2cea0cd6aab965637b4ee6945552aee0a9b1e28ba338d065f98e782e433f7e3ccd464f18bc2ba14307b453ab2b3de8172a7f186018008802e
-
SSDEEP
12288:9Yxg7plFfjTt/iCiUjM2CiRxNvRJdo/G20F2ilcVeaeW52VJ9GkwPhc:9YKp/jR6Cix2PnNRY+20F2jVEwkw5c
Malware Config
Extracted
xworm
127.0.0.1:7000
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral15/files/0x000d00000001202b-5.dat family_xworm behavioral15/memory/2620-8-0x0000000000360000-0x0000000000372000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 26 IoCs
pid Process 2620 XClient.exe 2500 Output.exe 2096 XClient.exe 2908 Output.exe 2804 XClient.exe 2948 Output.exe 2708 XClient.exe 1780 Output.exe 2692 XClient.exe 2744 Output.exe 2196 XClient.exe 1792 Output.exe 2112 XClient.exe 3036 Output.exe 2668 XClient.exe 2900 Output.exe 2008 XClient.exe 2884 Output.exe 1532 Output.exe 1564 XClient.exe 772 XClient.exe 264 Output.exe 1080 XClient.exe 2300 Output.exe 112 XClient.exe 692 Output.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2620 XClient.exe Token: SeDebugPrivilege 2096 XClient.exe Token: SeDebugPrivilege 2804 XClient.exe Token: SeDebugPrivilege 2708 XClient.exe Token: SeDebugPrivilege 2692 XClient.exe Token: SeDebugPrivilege 2196 XClient.exe Token: SeDebugPrivilege 2112 XClient.exe Token: SeDebugPrivilege 2668 XClient.exe Token: SeDebugPrivilege 2008 XClient.exe Token: SeDebugPrivilege 1564 XClient.exe Token: SeDebugPrivilege 772 XClient.exe Token: SeDebugPrivilege 1080 XClient.exe Token: SeDebugPrivilege 112 XClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2620 2628 cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe 30 PID 2628 wrote to memory of 2620 2628 cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe 30 PID 2628 wrote to memory of 2620 2628 cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe 30 PID 2628 wrote to memory of 2500 2628 cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe 31 PID 2628 wrote to memory of 2500 2628 cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe 31 PID 2628 wrote to memory of 2500 2628 cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe 31 PID 2500 wrote to memory of 2096 2500 Output.exe 32 PID 2500 wrote to memory of 2096 2500 Output.exe 32 PID 2500 wrote to memory of 2096 2500 Output.exe 32 PID 2500 wrote to memory of 2908 2500 Output.exe 33 PID 2500 wrote to memory of 2908 2500 Output.exe 33 PID 2500 wrote to memory of 2908 2500 Output.exe 33 PID 2908 wrote to memory of 2804 2908 Output.exe 34 PID 2908 wrote to memory of 2804 2908 Output.exe 34 PID 2908 wrote to memory of 2804 2908 Output.exe 34 PID 2908 wrote to memory of 2948 2908 Output.exe 35 PID 2908 wrote to memory of 2948 2908 Output.exe 35 PID 2908 wrote to memory of 2948 2908 Output.exe 35 PID 2948 wrote to memory of 2708 2948 Output.exe 36 PID 2948 wrote to memory of 2708 2948 Output.exe 36 PID 2948 wrote to memory of 2708 2948 Output.exe 36 PID 2948 wrote to memory of 1780 2948 Output.exe 37 PID 2948 wrote to memory of 1780 2948 Output.exe 37 PID 2948 wrote to memory of 1780 2948 Output.exe 37 PID 1780 wrote to memory of 2692 1780 Output.exe 38 PID 1780 wrote to memory of 2692 1780 Output.exe 38 PID 1780 wrote to memory of 2692 1780 Output.exe 38 PID 1780 wrote to memory of 2744 1780 Output.exe 39 PID 1780 wrote to memory of 2744 1780 Output.exe 39 PID 1780 wrote to memory of 2744 1780 Output.exe 39 PID 2744 wrote to memory of 2196 2744 Output.exe 40 PID 2744 wrote to memory of 2196 2744 Output.exe 40 PID 2744 wrote to memory of 2196 2744 Output.exe 40 PID 2744 wrote to memory of 1792 2744 Output.exe 41 PID 2744 wrote to memory of 1792 2744 Output.exe 41 PID 2744 wrote to memory of 1792 2744 Output.exe 41 PID 1792 wrote to memory of 2112 1792 Output.exe 42 PID 1792 wrote to memory of 2112 1792 Output.exe 42 PID 1792 wrote to memory of 2112 1792 Output.exe 42 PID 1792 wrote to memory of 3036 1792 Output.exe 43 PID 1792 wrote to memory of 3036 1792 Output.exe 43 PID 1792 wrote to memory of 3036 1792 Output.exe 43 PID 3036 wrote to memory of 2668 3036 Output.exe 44 PID 3036 wrote to memory of 2668 3036 Output.exe 44 PID 3036 wrote to memory of 2668 3036 Output.exe 44 PID 3036 wrote to memory of 2900 3036 Output.exe 45 PID 3036 wrote to memory of 2900 3036 Output.exe 45 PID 3036 wrote to memory of 2900 3036 Output.exe 45 PID 2900 wrote to memory of 2008 2900 Output.exe 46 PID 2900 wrote to memory of 2008 2900 Output.exe 46 PID 2900 wrote to memory of 2008 2900 Output.exe 46 PID 2900 wrote to memory of 2884 2900 Output.exe 47 PID 2900 wrote to memory of 2884 2900 Output.exe 47 PID 2900 wrote to memory of 2884 2900 Output.exe 47 PID 2884 wrote to memory of 1564 2884 Output.exe 48 PID 2884 wrote to memory of 1564 2884 Output.exe 48 PID 2884 wrote to memory of 1564 2884 Output.exe 48 PID 2884 wrote to memory of 1532 2884 Output.exe 49 PID 2884 wrote to memory of 1532 2884 Output.exe 49 PID 2884 wrote to memory of 1532 2884 Output.exe 49 PID 1532 wrote to memory of 772 1532 Output.exe 50 PID 1532 wrote to memory of 772 1532 Output.exe 50 PID 1532 wrote to memory of 772 1532 Output.exe 50 PID 1532 wrote to memory of 264 1532 Output.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe"C:\Users\Admin\AppData\Local\Temp\cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"12⤵
- Executes dropped EXE
PID:264 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"13⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"14⤵
- Executes dropped EXE
PID:692
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD5be28798fb13ebd61d94d6712436dc399
SHA1186c13dd590594a63e81b24205d1520a2e03b2cc
SHA25645be306e0f454b946091c3c0742655878a7eb69a1c7675c9a677438f4e684c34
SHA512473273021ba324077ae022c8bb10e457d78ce1bfeef95045287915fd15bf1e23cf5a2db42d67c4bb93aba4babb9a8cc71e906ed305f6ad223cf5d1e4534b86a1
-
Filesize
50KB
MD5e0918682feb10b28a39a9cfbf4d2d90c
SHA1c33f8518747e96955387bac3c8299eea24357fe0
SHA2568f7a69675281f0e5f2fd0b43c64434fdb132fdca1eb82cf23aa947f83c833d01
SHA512dcb3961832197bf33b4e554a69b95a17c847fccde7211ca96ee0a9ad975a051f93e6f29a3a9525279b2aaf9d6b7208a8ddeb8c1d430e79ddf4155f5629038fa7