File name:

Swift-Bootstrapper.rar

Full analysis: https://app.any.run/tasks/48361895-304a-4b21-bf32-a96a7d69fe2b
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: December 22, 2024, 17:45:51
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
xworm
remote
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

40CFAE2D1AF47E218F39212C1379F859

SHA1:

96EF1B48174CB9269B403E0350B8053C5E76B0C2

SHA256:

09FBC6F179BCFB0C7AD6C0F5D0F5351EA912B29FAAC3D48634044F65C2FA9D57

SSDEEP:

49152:epFmlQFNBYk1PSOi/jHlLoRpDgbbPQJ6DfRM4Dydmpsdg645ycf8AKnP681OoBnH:epFBFNBYk1SLjFuebbjDITg64558AiPN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XWORM has been detected (YARA)

      • SwiftLoader.exe (PID: 3876)
    • XWORM has been detected (SURICATA)

      • SwiftLoader.exe (PID: 3876)
    • Uses Task Scheduler to run other applications

      • SwiftLoader.exe (PID: 3876)
    • Create files in the Startup directory

      • SwiftLoader.exe (PID: 3876)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 900)
      • SwiftLoader.exe (PID: 3876)
    • Checks for external IP

      • svchost.exe (PID: 2192)
      • SwiftLoader.exe (PID: 3876)
    • Executable content was dropped or overwritten

      • SwiftLoader.exe (PID: 3876)
    • The process creates files with name similar to system file names

      • SwiftLoader.exe (PID: 3876)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 2192)
    • Connects to unusual port

      • SwiftLoader.exe (PID: 3876)
    • Reads the date of Windows installation

      • SwiftLoader.exe (PID: 3876)
    • Contacting a server suspected of hosting an CnC

      • SwiftLoader.exe (PID: 3876)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 900)
    • Reads the machine GUID from the registry

      • SwiftLoader.exe (PID: 3876)
    • Reads the computer name

      • SwiftLoader.exe (PID: 3876)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 900)
      • SwiftLoader.exe (PID: 3876)
    • Checks supported languages

      • SwiftLoader.exe (PID: 3876)
    • Reads Environment values

      • SwiftLoader.exe (PID: 3876)
    • Checks proxy server information

      • SwiftLoader.exe (PID: 3876)
    • Disables trace logs

      • SwiftLoader.exe (PID: 3876)
    • Process checks computer location settings

      • SwiftLoader.exe (PID: 3876)
    • Creates files or folders in the user directory

      • SwiftLoader.exe (PID: 3876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(3876) SwiftLoader.exe
C2aragornsigma-20749.portmap.host:20749
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexDtwiFv6V6PGeAeni
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 1475440
UncompressedSize: 5979648
OperatingSystem: Win32
ArchivedFileName: Swift/swift-bootstrapper.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #XWORM swiftloader.exe svchost.exe schtasks.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
900"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Swift-Bootstrapper.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3288"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "System" /tr "C:\Users\admin\AppData\Roaming\System.exe"C:\Windows\System32\schtasks.exeSwiftLoader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3876"C:\Users\admin\AppData\Local\Temp\Rar$EXb900.37238\Swift\SwiftLoader.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb900.37238\Swift\SwiftLoader.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb900.37238\swift\swiftloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(3876) SwiftLoader.exe
C2aragornsigma-20749.portmap.host:20749
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexDtwiFv6V6PGeAeni
5300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 223
Read events
4 200
Write events
23
Delete events
0

Modification events

(PID) Process:(900) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(900) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(900) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(900) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Swift-Bootstrapper.rar
(PID) Process:(900) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(900) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(900) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(900) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(900) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(3876) SwiftLoader.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SwiftLoader_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
Executable files
3
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3876SwiftLoader.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnkbinary
MD5:69BBBB029EC29EBD8ED6F9881AFEACD4
SHA256:0B2C544D4CDA9875F14CDEAF3D7A108CD3205454909D6E05E11C965467363A01
900WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb900.37238\Swift\swift-bootstrapper.exeexecutable
MD5:26E350B6F17A777A79B8BE46E1B06AC0
SHA256:29C535C85CA221059C46B364B9B6A81E68A0E0A6AEF5DA460DCB0DADDF90D2F1
3876SwiftLoader.exeC:\Users\admin\AppData\Roaming\System.exeexecutable
MD5:7270EAA48A83A7F6BA8F4510DF028CCB
SHA256:52B382A300767FE3160BEDABDC3B8DAEDF9D11D9B9F9A0FE5D978EBBC8B8F2F3
900WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb900.37238\Swift\SwiftLoader.exeexecutable
MD5:7270EAA48A83A7F6BA8F4510DF028CCB
SHA256:52B382A300767FE3160BEDABDC3B8DAEDF9D11D9B9F9A0FE5D978EBBC8B8F2F3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
38
DNS requests
20
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3876
SwiftLoader.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
6356
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6356
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1580
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2632
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
2632
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
104.126.37.144:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.bing.com
  • 104.126.37.144
  • 104.126.37.154
  • 104.126.37.123
  • 104.126.37.145
  • 104.126.37.153
  • 104.126.37.163
  • 104.126.37.170
  • 104.126.37.162
  • 104.126.37.136
whitelisted
login.live.com
  • 20.190.160.14
  • 40.126.32.76
  • 20.190.160.17
  • 20.190.160.20
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.136
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
ip-api.com
  • 208.95.112.1
shared
go.microsoft.com
  • 23.35.238.131
whitelisted
aragornsigma-20749.portmap.host
  • 193.161.193.99
malicious

Threats

PID
Process
Class
Message
3876
SwiftLoader.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
2192
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
3876
SwiftLoader.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2192
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2192
svchost.exe
Potential Corporate Privacy Violation
ET POLICY DNS Query to a Reverse Proxy Service Observed
2192
svchost.exe
Misc activity
ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host)
3876
SwiftLoader.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
3876
SwiftLoader.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
3876
SwiftLoader.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
3876
SwiftLoader.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
No debug info