File name:

taskshostw.exe

Full analysis: https://app.any.run/tasks/10f8fac3-faa5-4fcf-abba-f50734c06013
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: January 16, 2023, 18:55:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
xworm
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

E538F67D529D672C55304F3C9AD05392

SHA1:

F7FF40A1901D51DD6222B420BBECE575B46B2CD2

SHA256:

124C17B099D8C09DB4BD82B5EF3D41CEA61727A480ABFD56A943208D858EA8CF

SSDEEP:

3072:eTIu4ZQ8M2A1vA7m5+C6ZoEHBAnpK37nXz8o1008Q75wPsoB74tyJhvSK/KkMc/X:LHA1vweOR8CTwPnLKkM/u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • taskshostw.exe (PID: 2056)
    • Writes to the Start menu file

      • taskshostw.exe (PID: 2056)
    • Uses Task Scheduler to run other applications

      • taskshostw.exe (PID: 2056)
    • XWORM detected by memory dumps

      • taskshostw.exe (PID: 2056)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • taskshostw.exe (PID: 2056)
    • Reads the Internet Settings

      • taskshostw.exe (PID: 2056)
    • Reads settings of System Certificates

      • taskshostw.exe (PID: 2056)
    • Executes via Task Scheduler

      • taskshostw.exe (PID: 4088)
  • INFO

    • Checks supported languages

      • taskshostw.exe (PID: 2056)
      • taskshostw.exe (PID: 4088)
    • The process checks LSA protection

      • taskshostw.exe (PID: 2056)
      • taskshostw.exe (PID: 4088)
    • Reads the computer name

      • taskshostw.exe (PID: 2056)
      • taskshostw.exe (PID: 4088)
    • Reads the machine GUID from the registry

      • taskshostw.exe (PID: 2056)
      • taskshostw.exe (PID: 4088)
    • Creates files or folders in the user directory

      • taskshostw.exe (PID: 2056)
    • Reads Environment values

      • taskshostw.exe (PID: 2056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(2056) taskshostw.exe
Keys
AES<agent>
Options
SPL<Sngrok>
Mutex3t3fVmURCwvXxf1P
Files
USB Drop Namefilename.exe
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2023-Jan-12 19:14:02

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 128

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 3
TimeDateStamp: 2023-Jan-12 19:14:02
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
8192
248000
248320
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.57153
.rsrc
262144
1704
2048
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
3.68702
.reloc
270336
12
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
0
6
Latin 1 / Western European
UNKNOWN
RT_GROUP_ICON
1 (#2)
3.46628
976
Latin 1 / Western European
UNKNOWN
RT_VERSION
1 (#3)
5.00112
490
Latin 1 / Western European
UNKNOWN
RT_MANIFEST

Imports

mscoree.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #XWORM taskshostw.exe schtasks.exe no specs taskshostw.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2056"C:\Users\admin\AppData\Local\Temp\taskshostw.exe" C:\Users\admin\AppData\Local\Temp\taskshostw.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Tasks
Exit code:
0
Version:
10.0.19041.1865
XWorm
(PID) Process(2056) taskshostw.exe
Keys
AES<agent>
Options
SPL<Sngrok>
Mutex3t3fVmURCwvXxf1P
Files
USB Drop Namefilename.exe
2324"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "taskshostw" /tr "C:\Users\admin\AppData\Roaming\taskshostw.exe"C:\Windows\System32\schtasks.exetaskshostw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
4088C:\Users\admin\AppData\Roaming\taskshostw.exe C:\Users\admin\AppData\Roaming\taskshostw.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Tasks
Exit code:
0
Version:
10.0.19041.1865
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2056taskshostw.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\taskshostw.exeexecutable
MD5:E538F67D529D672C55304F3C9AD05392
SHA256:124C17B099D8C09DB4BD82B5EF3D41CEA61727A480ABFD56A943208D858EA8CF
2056taskshostw.exeC:\Users\admin\AppData\Roaming\taskshostw.exeexecutable
MD5:E538F67D529D672C55304F3C9AD05392
SHA256:124C17B099D8C09DB4BD82B5EF3D41CEA61727A480ABFD56A943208D858EA8CF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2056
taskshostw.exe
172.67.34.170:443
pastebin.com
CLOUDFLARENET
US
malicious

DNS requests

Domain
IP
Reputation
pastebin.com
  • 172.67.34.170
  • 104.20.67.143
  • 104.20.68.143
malicious

Threats

No threats detected
No debug info