Overview
overview
10Static
static
10a6b7e1f8d9...13.exe
windows7-x64
10a6b7e1f8d9...13.exe
windows10-2004-x64
10a6d91e550d...6e.exe
windows7-x64
7a6d91e550d...6e.exe
windows10-2004-x64
7a72cdbd8e2...ad.exe
windows7-x64
10a72cdbd8e2...ad.exe
windows10-2004-x64
10a731427f52...04.exe
windows7-x64
6a731427f52...04.exe
windows10-2004-x64
6a73951d873...67.exe
windows7-x64
10a73951d873...67.exe
windows10-2004-x64
10a74be4d5e7...73.exe
windows7-x64
10a74be4d5e7...73.exe
windows10-2004-x64
10a77ff4e4dd...87.exe
windows7-x64
10a77ff4e4dd...87.exe
windows10-2004-x64
10a799e456ff...88.exe
windows7-x64
10a799e456ff...88.exe
windows10-2004-x64
10a7c49036eb...95.exe
windows7-x64
3a7c49036eb...95.exe
windows10-2004-x64
3a7d8553ba6...a8.exe
windows7-x64
7a7d8553ba6...a8.exe
windows10-2004-x64
7a7e953c880...28.exe
windows7-x64
10a7e953c880...28.exe
windows10-2004-x64
10a7ead69ceb...a3.exe
windows7-x64
9a7ead69ceb...a3.exe
windows10-2004-x64
9a7ec6d64b2...db.exe
windows7-x64
1a7ec6d64b2...db.exe
windows10-2004-x64
1a7fd5ae1f0...f8.exe
windows7-x64
10a7fd5ae1f0...f8.exe
windows10-2004-x64
10a884e586e0...e0.exe
windows7-x64
10a884e586e0...e0.exe
windows10-2004-x64
10a8b0399c70...33.exe
windows7-x64
10a8b0399c70...33.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win10v2004-20250314-en
General
-
Target
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
-
Size
513KB
-
MD5
bee8b480b0eaca7a667e7167fb8a90d9
-
SHA1
9f313636052c520f376c1dd78db8965206828a49
-
SHA256
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528
-
SHA512
4307592c42fc62376d5ca68dc877160ce78ab6521ac14ef8a17f0acaae3b2751ffee7100b555f8027142ad1e5992b80d9c5a012ffebd8c02804090c9244e3f76
-
SSDEEP
12288:47eq029boZJl4K5qFy8Q3txiiCsi6usc6JPE7G/7Btt:4eqAjIF8WsShAPEQ7
Malware Config
Extracted
xworm
127.0.0.1:7000
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral21/files/0x000d00000001226b-5.dat family_xworm behavioral21/memory/2748-9-0x0000000000E50000-0x0000000000E62000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 26 IoCs
pid Process 2748 XClient.exe 2664 Output.exe 2620 Output.exe 2824 XClient.exe 2548 Output.exe 2528 XClient.exe 3056 Output.exe 3044 XClient.exe 3028 Output.exe 2944 XClient.exe 1260 XClient.exe 2852 Output.exe 1684 Output.exe 1252 XClient.exe 592 XClient.exe 2900 Output.exe 2740 XClient.exe 1624 Output.exe 1660 XClient.exe 2084 Output.exe 2156 XClient.exe 1292 Output.exe 2184 XClient.exe 1092 Output.exe 1384 Output.exe 2208 XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2748 XClient.exe Token: SeDebugPrivilege 2824 XClient.exe Token: SeDebugPrivilege 2528 XClient.exe Token: SeDebugPrivilege 3044 XClient.exe Token: SeDebugPrivilege 2944 XClient.exe Token: SeDebugPrivilege 1260 XClient.exe Token: SeDebugPrivilege 1252 XClient.exe Token: SeDebugPrivilege 592 XClient.exe Token: SeDebugPrivilege 2740 XClient.exe Token: SeDebugPrivilege 1660 XClient.exe Token: SeDebugPrivilege 2156 XClient.exe Token: SeDebugPrivilege 2184 XClient.exe Token: SeDebugPrivilege 2208 XClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2748 2672 a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe 30 PID 2672 wrote to memory of 2748 2672 a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe 30 PID 2672 wrote to memory of 2748 2672 a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe 30 PID 2672 wrote to memory of 2664 2672 a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe 31 PID 2672 wrote to memory of 2664 2672 a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe 31 PID 2672 wrote to memory of 2664 2672 a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe 31 PID 2664 wrote to memory of 2824 2664 Output.exe 32 PID 2664 wrote to memory of 2824 2664 Output.exe 32 PID 2664 wrote to memory of 2824 2664 Output.exe 32 PID 2664 wrote to memory of 2620 2664 Output.exe 33 PID 2664 wrote to memory of 2620 2664 Output.exe 33 PID 2664 wrote to memory of 2620 2664 Output.exe 33 PID 2620 wrote to memory of 2528 2620 Output.exe 34 PID 2620 wrote to memory of 2528 2620 Output.exe 34 PID 2620 wrote to memory of 2528 2620 Output.exe 34 PID 2620 wrote to memory of 2548 2620 Output.exe 35 PID 2620 wrote to memory of 2548 2620 Output.exe 35 PID 2620 wrote to memory of 2548 2620 Output.exe 35 PID 2548 wrote to memory of 3044 2548 Output.exe 36 PID 2548 wrote to memory of 3044 2548 Output.exe 36 PID 2548 wrote to memory of 3044 2548 Output.exe 36 PID 2548 wrote to memory of 3056 2548 Output.exe 37 PID 2548 wrote to memory of 3056 2548 Output.exe 37 PID 2548 wrote to memory of 3056 2548 Output.exe 37 PID 3056 wrote to memory of 2944 3056 Output.exe 38 PID 3056 wrote to memory of 2944 3056 Output.exe 38 PID 3056 wrote to memory of 2944 3056 Output.exe 38 PID 3056 wrote to memory of 3028 3056 Output.exe 39 PID 3056 wrote to memory of 3028 3056 Output.exe 39 PID 3056 wrote to memory of 3028 3056 Output.exe 39 PID 3028 wrote to memory of 1260 3028 Output.exe 40 PID 3028 wrote to memory of 1260 3028 Output.exe 40 PID 3028 wrote to memory of 1260 3028 Output.exe 40 PID 3028 wrote to memory of 2852 3028 Output.exe 41 PID 3028 wrote to memory of 2852 3028 Output.exe 41 PID 3028 wrote to memory of 2852 3028 Output.exe 41 PID 2852 wrote to memory of 1252 2852 Output.exe 42 PID 2852 wrote to memory of 1252 2852 Output.exe 42 PID 2852 wrote to memory of 1252 2852 Output.exe 42 PID 2852 wrote to memory of 1684 2852 Output.exe 43 PID 2852 wrote to memory of 1684 2852 Output.exe 43 PID 2852 wrote to memory of 1684 2852 Output.exe 43 PID 1684 wrote to memory of 592 1684 Output.exe 44 PID 1684 wrote to memory of 592 1684 Output.exe 44 PID 1684 wrote to memory of 592 1684 Output.exe 44 PID 1684 wrote to memory of 2900 1684 Output.exe 45 PID 1684 wrote to memory of 2900 1684 Output.exe 45 PID 1684 wrote to memory of 2900 1684 Output.exe 45 PID 2900 wrote to memory of 2740 2900 Output.exe 46 PID 2900 wrote to memory of 2740 2900 Output.exe 46 PID 2900 wrote to memory of 2740 2900 Output.exe 46 PID 2900 wrote to memory of 1624 2900 Output.exe 47 PID 2900 wrote to memory of 1624 2900 Output.exe 47 PID 2900 wrote to memory of 1624 2900 Output.exe 47 PID 1624 wrote to memory of 1660 1624 Output.exe 48 PID 1624 wrote to memory of 1660 1624 Output.exe 48 PID 1624 wrote to memory of 1660 1624 Output.exe 48 PID 1624 wrote to memory of 2084 1624 Output.exe 49 PID 1624 wrote to memory of 2084 1624 Output.exe 49 PID 1624 wrote to memory of 2084 1624 Output.exe 49 PID 2084 wrote to memory of 2156 2084 Output.exe 50 PID 2084 wrote to memory of 2156 2084 Output.exe 50 PID 2084 wrote to memory of 2156 2084 Output.exe 50 PID 2084 wrote to memory of 1292 2084 Output.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe"C:\Users\Admin\AppData\Local\Temp\a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"12⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"13⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Users\Admin\AppData\Roaming\Output.exe"C:\Users\Admin\AppData\Roaming\Output.exe"14⤵
- Executes dropped EXE
PID:1384
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD568e298b36db386382e7dfbe5bd784699
SHA1123700bc8004ee6c9967a6818689658c23cf4996
SHA256342f2b5aa4fb4c3d9bfa18f7ff3e96ac5a21db19b8635b92ca789dfcb4e55875
SHA512879f41008ddd3464026b5c93338246fddfcc640e2790bf3d106555e22103dde1bfc33e23125e891a676daa263635518142cbf481f91b0671adfadce63222a562
-
Filesize
50KB
MD5e0918682feb10b28a39a9cfbf4d2d90c
SHA1c33f8518747e96955387bac3c8299eea24357fe0
SHA2568f7a69675281f0e5f2fd0b43c64434fdb132fdca1eb82cf23aa947f83c833d01
SHA512dcb3961832197bf33b4e554a69b95a17c847fccde7211ca96ee0a9ad975a051f93e6f29a3a9525279b2aaf9d6b7208a8ddeb8c1d430e79ddf4155f5629038fa7