| File name: | APERTURA PROCESO JUDICIAL RAD 10000065665655 (1).exe |
| Full analysis: | https://app.any.run/tasks/057dae23-baf4-4359-a050-c209c67db7ad |
| Verdict: | Malicious activity |
| Threats: | XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails. |
| Analysis date: | March 11, 2024, 21:34:19 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 4C05ADC3E8C9C33AEF8F16B792611B5A |
| SHA1: | BA8E0AA92AAECE848FB767F571A4D8F5DFBEB1E3 |
| SHA256: | 002B460BB8897B957E0443DBA7A31840440BA9D8EBD7A0F4FABB58109A42FDA8 |
| SSDEEP: | 24576:r1gqBDhlQupMQv5tiQTHNY3BD5El1vUDhYebw4TsHYSCbUk1cjFt:rLhlQ6NY3fK4TsUbU/Ft |
| .exe | | | Inno Setup installer (67.7) |
|---|---|---|
| .exe | | | Win32 EXE PECompact compressed (generic) (25.6) |
| .exe | | | Win32 Executable (generic) (2.7) |
| .exe | | | Win16/32 Executable Delphi generic (1.2) |
| .exe | | | Generic Win/DOS Executable (1.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:11:15 09:48:30+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 741376 |
| InitializedDataSize: | 406016 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xb5eec |
| OSVersion: | 6.1 |
| ImageVersion: | 6 |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 5.28.3.0 |
| ProductVersionNumber: | 5.28.3.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | OneLaunch |
| FileDescription: | OneLaunch Setup |
| FileVersion: | 5.28.3 |
| LegalCopyright: | Copyright OneLaunch. All rights reserved. |
| OriginalFileName: | |
| ProductName: | OneLaunch |
| ProductVersion: | 5.28.3 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1432 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | APERTURA PROCESO JUDICIAL RAD 10000065665655 (1).exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual Basic Command Line Compiler Exit code: 0 Version: 14.8.3761.0 Modules
XWorm(PID) Process(1432) vbc.exe C2fenvijsdfidfisdiodwhfuew.con-ip.com:7000 Keys AES<123456789> Options Splitter<Xwormmm> Sleep time3 USB drop nameFRIO MutexQ7vK4o7XeUsEmAUh | |||||||||||||||
| 2472 | "C:\Users\admin\AppData\Local\Temp\APERTURA PROCESO JUDICIAL RAD 10000065665655 (1).exe" | C:\Users\admin\AppData\Local\Temp\APERTURA PROCESO JUDICIAL RAD 10000065665655 (1).exe | — | explorer.exe | |||||||||||
User: admin Company: OneLaunch Integrity Level: MEDIUM Description: OneLaunch Setup Exit code: 0 Version: 5.28.3 Modules
| |||||||||||||||
| (PID) Process: | (2472) APERTURA PROCESO JUDICIAL RAD 10000065665655 (1).exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication |
| Operation: | write | Name: | Name |
Value: APERTURA PROCESO JUDICIAL RAD 10000065665655 (1).exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1432 | vbc.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Temp.lnk | lnk | |
MD5:23C6AD68C9FA351F5C69C8ACB859FF42 | SHA256:619CC0C64B6535454CBD75B338B9E6517E83A658A3BF386904D253FE7A2E51C4 | |||
| 1432 | vbc.exe | C:\Users\admin\AppData\Roaming\Temp.exe | executable | |
MD5:FCCB961AE76D9E600A558D2D0225ED43 | SHA256:466876F453563A272ADB5D568670ECA98D805E7ECAA5A2E18C92B6D3C947DF93 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1432 | vbc.exe | 181.136.226.14:7000 | fenvijsdfidfisdiodwhfuew.con-ip.com | EPM Telecomunicaciones S.A. E.S.P. | CO | unknown |
Domain | IP | Reputation |
|---|---|---|
fenvijsdfidfisdiodwhfuew.con-ip.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Potentially Bad Traffic | ET INFO DNS Redirection Service Domain in DNS Lookup (con-ip .com) |