Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-06-2024 16:24
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
XClient.exe
Resource
win11-20240611-en
General
-
Target
XClient.exe
-
Size
63KB
-
MD5
b80f607a11a29e9e7f3192a0ff95e33a
-
SHA1
484622864005f1c5e65b7657089e9554623fd613
-
SHA256
f65c276f46ef90d4e70fd68e19db8f25af8810505bb832d8961d2a6e4caf17ae
-
SHA512
433358edaea23d477d0624074c92134259c8f83802be7a57182fb13d475a9c630f644de1f9e0697d9500053b348c1ba02dd16045960393fad2e73c7c93a6a66e
-
SSDEEP
1536:e1TE0/4/Ja43jHy7b0ToCRPp56O+T7K28BR8:eFwxhHWb0k0p56Oa7K/8
Malware Config
Extracted
xworm
paris-itself.gl.at.ply.gg:49485
-
Install_directory
%Public%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2216-1-0x0000000000740000-0x0000000000756000-memory.dmp family_xworm C:\Users\Public\svchost family_xworm -
Drops startup file 2 IoCs
Processes:
XClient.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe -
Executes dropped EXE 2 IoCs
Processes:
svchostsvchostpid process 4740 svchost 1868 svchost -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
XClient.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Public\\svchost" XClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4980 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
XClient.exepid process 2216 XClient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
XClient.exesvchostsvchostdescription pid process Token: SeDebugPrivilege 2216 XClient.exe Token: SeDebugPrivilege 2216 XClient.exe Token: SeDebugPrivilege 4740 svchost Token: SeDebugPrivilege 1868 svchost -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
XClient.exepid process 2216 XClient.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
XClient.execmd.exedescription pid process target process PID 2216 wrote to memory of 4836 2216 XClient.exe schtasks.exe PID 2216 wrote to memory of 4836 2216 XClient.exe schtasks.exe PID 2216 wrote to memory of 3004 2216 XClient.exe schtasks.exe PID 2216 wrote to memory of 3004 2216 XClient.exe schtasks.exe PID 2216 wrote to memory of 1872 2216 XClient.exe cmd.exe PID 2216 wrote to memory of 1872 2216 XClient.exe cmd.exe PID 1872 wrote to memory of 4980 1872 cmd.exe timeout.exe PID 1872 wrote to memory of 4980 1872 cmd.exe timeout.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Public\svchost"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "svchost"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC20E.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Public\svchostC:\Users\Public\svchost1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Public\svchostC:\Users\Public\svchost1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.logFilesize
654B
MD516c5fce5f7230eea11598ec11ed42862
SHA175392d4824706090f5e8907eee1059349c927600
SHA25687ba77c13905298acbac72be90949c4fe0755b6eff9777615aa37f252515f151
SHA512153edd6da59beea6cc411ed7383c32916425d6ebb65f04c65aab7c1d6b25443d143aa8449aa92149de0ad8a975f6ecaa60f9f7574536eec6b38fe5fd3a6c6adc
-
C:\Users\Admin\AppData\Local\Temp\tmpC20E.tmp.batFilesize
159B
MD5c31b77218caf541ace86599c4133751d
SHA1a6572be015605514e63e2b91bc8179a9c97b6d04
SHA256d6bb521f04ab11d9289d4e229f363f9e7a3b3b5cf5a55937e833f1f0325f0d8f
SHA512d8639a02a61da6efd9aec4357b4cc6ecdd5ba2362fbce0cbd7a3123261dbc2ff2f23b895d2027a05632b312259ece5aee862b11d49f7cf5f54a841384c40103c
-
C:\Users\Public\svchostFilesize
63KB
MD5b80f607a11a29e9e7f3192a0ff95e33a
SHA1484622864005f1c5e65b7657089e9554623fd613
SHA256f65c276f46ef90d4e70fd68e19db8f25af8810505bb832d8961d2a6e4caf17ae
SHA512433358edaea23d477d0624074c92134259c8f83802be7a57182fb13d475a9c630f644de1f9e0697d9500053b348c1ba02dd16045960393fad2e73c7c93a6a66e
-
memory/2216-0-0x00007FFFE5E03000-0x00007FFFE5E04000-memory.dmpFilesize
4KB
-
memory/2216-1-0x0000000000740000-0x0000000000756000-memory.dmpFilesize
88KB
-
memory/2216-2-0x00007FFFE5E00000-0x00007FFFE67EC000-memory.dmpFilesize
9.9MB
-
memory/2216-6-0x00007FFFE5E03000-0x00007FFFE5E04000-memory.dmpFilesize
4KB
-
memory/2216-7-0x00007FFFE5E00000-0x00007FFFE67EC000-memory.dmpFilesize
9.9MB
-
memory/2216-21-0x00007FFFE5E00000-0x00007FFFE67EC000-memory.dmpFilesize
9.9MB
-
memory/4740-11-0x00007FFFE5E00000-0x00007FFFE67EC000-memory.dmpFilesize
9.9MB
-
memory/4740-13-0x00007FFFE5E00000-0x00007FFFE67EC000-memory.dmpFilesize
9.9MB