File name:

WizWorm.exe

Full analysis: https://app.any.run/tasks/eb5a923a-0760-4264-93bf-7ec7d864955a
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: February 21, 2025, 23:22:26
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
sheetrat
rat
ip-check
crypto-regex
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

0D7B4B1882F63BDD50B95C566D71AE14

SHA1:

FD44458018D9BA5BEEE8A67B7F22BB5C6E1F850D

SHA256:

4A095CF379D66C7123416FEC489A8EF6B767FEC71959E13714127D6C3BB41C06

SSDEEP:

196608:6FIIUdrFMlm6GSemy0C3jsfR+ldusfS7CCF5ZBM:6FIIUdrFM06M0C3jsfR+lcRuCF5s

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SHEETRAT has been detected (YARA)

      • WizWorm.exe (PID: 2940)
  • SUSPICIOUS

    • Found regular expressions for crypto-addresses (YARA)

      • WizWorm.exe (PID: 2940)
    • Executes application which crashes

      • WizWorm.exe (PID: 2940)
    • There is functionality for capture public ip (YARA)

      • WizWorm.exe (PID: 2940)
  • INFO

    • Reads the machine GUID from the registry

      • WizWorm.exe (PID: 2940)
    • Reads the computer name

      • WizWorm.exe (PID: 2940)
    • Checks proxy server information

      • WerFault.exe (PID: 6404)
    • Reads the software policy settings

      • WerFault.exe (PID: 6404)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6404)
    • Checks supported languages

      • WizWorm.exe (PID: 2940)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:08:28 05:37:40+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 80
CodeSize: 15029760
InitializedDataSize: 10752
UninitializedDataSize: -
EntryPoint: 0xe574ee
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 4.0.0.0
ProductVersionNumber: 4.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Discord : WizNon#2881
CompanyName: -
FileDescription: WizWorm
FileVersion: 4.0.0.0
InternalName: WizWorm.exe
LegalCopyright: Copyright © 2023
LegalTrademarks: -
OriginalFileName: WizWorm.exe
ProductName: WizWorm
ProductVersion: 4.0.0.0
AssemblyVersion: 4.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #SHEETRAT wizworm.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
2940"C:\Users\admin\AppData\Local\Temp\WizWorm.exe" C:\Users\admin\AppData\Local\Temp\WizWorm.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
WizWorm
Exit code:
3762504530
Version:
4.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\wizworm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6404C:\WINDOWS\system32\WerFault.exe -u -p 2940 -s 1148C:\Windows\System32\WerFault.exe
WizWorm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
Total events
3 373
Read events
3 373
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
6
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6404WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_WizWorm.exe_36ddaf5c5a2501733e602ac061ee1d5be1dc42_3e9373f7_941fc36d-e5c2-4620-ac70-1771353e94b5\Report.wer
MD5:
SHA256:
6404WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\WizWorm.exe.2940.dmp
MD5:
SHA256:
6404WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:073C3976400C4F1B56E6E0BBB95FB6E9
SHA256:91405C2F64AFCBA0847EF2FD0D01B5732AABA2FC2272B46F99D8C4D941CF93C1
6404WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER60C3.tmp.xmlxml
MD5:F7880431E85B2F82A91B8BFADD59DDC9
SHA256:2A9270D025F2C28EC0F680A2EC70129E0117840DFACE5807E1582F79DD2F11C7
6404WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6083.tmp.WERInternalMetadata.xmlbinary
MD5:FAEFD2B23A005DBA1478C2D08F8E56A5
SHA256:1D0A1F6656C2005A4B7545422C0A13F9189DA4864B4EE03C1834E0B79A3A7CC3
6404WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5E30.tmp.dmpbinary
MD5:4832C4F83453CAFFE303D60FA736A4FA
SHA256:7E5153CA1B749219938EFDEE0BD104E57457A3B861F5B9EDB2D760154CBE86F9
6404WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:680B0331A3CC8FCCE16367586EC7A721
SHA256:19F1B5D2C7F62663C14D97578411DC610E5F33E6CE4165977314442435F15305
6404WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6404WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:C760BD69C394DEF8B0174E6FD04CDAB7
SHA256:7FE120A827FA404A408F30980019242007C753FF9CD95EFE86F35F497046EC4C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
37
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6404
WerFault.exe
GET
200
92.123.22.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6944
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6944
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6404
WerFault.exe
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
92.123.104.32:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
  • 2.16.164.72
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 92.123.22.101
whitelisted
google.com
  • 142.250.186.110
whitelisted
www.bing.com
  • 92.123.104.32
  • 92.123.104.34
whitelisted
login.live.com
  • 20.190.160.67
  • 20.190.160.2
  • 20.190.160.22
  • 40.126.32.136
  • 20.190.160.64
  • 20.190.160.132
  • 20.190.160.4
  • 20.190.160.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info