File name:

AnyDesk.exe

Full analysis: https://app.any.run/tasks/a0158435-fed5-4639-ac41-e5f71eec387e
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: March 05, 2024, 22:40:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
xworm
remote
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

A21768190F3B9FEAE33AAEF660CB7A83

SHA1:

24780657328783EF50AE0964B23288E68841A421

SHA256:

55E4CE3FE726043070ECD7DE5A74B2459EA8BED19EF2A36CE7884B2AB0863047

SSDEEP:

98304:77G2MoEslkjwWvZNy87N6IWwZ/wszMRAx8SvePTqWeYaPPYZOkL67enf5Lglp4mK:xaPWzKc818XE58BZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • AnyDesk.exe (PID: 2160)
      • AnyDesk.exe (PID: 3732)
      • e.exe (PID: 2960)
    • Adds path to the Windows Defender exclusion list

      • e.exe (PID: 2960)
    • Changes powershell execution policy (Bypass)

      • e.exe (PID: 2960)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 3068)
      • powershell.exe (PID: 492)
      • powershell.exe (PID: 2488)
      • powershell.exe (PID: 3224)
    • Adds process to the Windows Defender exclusion list

      • e.exe (PID: 2960)
    • Changes the autorun value in the registry

      • e.exe (PID: 2960)
    • Create files in the Startup directory

      • e.exe (PID: 2960)
    • XWORM has been detected (YARA)

      • e.exe (PID: 2960)
    • XWORM has been detected (SURICATA)

      • e.exe (PID: 2960)
  • SUSPICIOUS

    • Application launched itself

      • AnyDesk.exe (PID: 2160)
    • Reads the Internet Settings

      • AnyDesk.exe (PID: 3708)
      • e.exe (PID: 2960)
      • powershell.exe (PID: 2488)
      • powershell.exe (PID: 3068)
      • powershell.exe (PID: 3224)
      • powershell.exe (PID: 492)
    • Executable content was dropped or overwritten

      • AnyDesk.exe (PID: 3732)
      • e.exe (PID: 2960)
    • Script adds exclusion path to Windows Defender

      • e.exe (PID: 2960)
    • Reads security settings of Internet Explorer

      • e.exe (PID: 2960)
    • Starts POWERSHELL.EXE for commands execution

      • e.exe (PID: 2960)
    • Checks for external IP

      • e.exe (PID: 2960)
    • Using PowerShell to operate with local accounts

      • powershell.exe (PID: 3068)
      • powershell.exe (PID: 2488)
      • powershell.exe (PID: 3224)
      • powershell.exe (PID: 492)
    • Script adds exclusion process to Windows Defender

      • e.exe (PID: 2960)
    • The process creates files with name similar to system file names

      • e.exe (PID: 2960)
    • Connects to unusual port

      • e.exe (PID: 2960)
    • Reads settings of System Certificates

      • e.exe (PID: 2960)
    • The process executes via Task Scheduler

      • dllhost.exe (PID: 948)
      • dllhost.exe (PID: 1380)
  • INFO

    • Reads the computer name

      • AnyDesk.exe (PID: 2160)
      • AnyDesk.exe (PID: 3732)
      • e.exe (PID: 2960)
      • AnyDesk.exe (PID: 3708)
      • wmpnscfg.exe (PID: 2376)
      • dllhost.exe (PID: 948)
      • dllhost.exe (PID: 1380)
    • Checks supported languages

      • AnyDesk.exe (PID: 2160)
      • AnyDesk.exe (PID: 3732)
      • AnyDesk.exe (PID: 3708)
      • e.exe (PID: 2960)
      • wmpnscfg.exe (PID: 2376)
      • dllhost.exe (PID: 948)
      • dllhost.exe (PID: 1380)
    • Process checks whether UAC notifications are on

      • AnyDesk.exe (PID: 2160)
    • Reads the machine GUID from the registry

      • AnyDesk.exe (PID: 2160)
      • AnyDesk.exe (PID: 3732)
      • AnyDesk.exe (PID: 3708)
      • e.exe (PID: 2960)
      • dllhost.exe (PID: 948)
      • dllhost.exe (PID: 1380)
    • Creates files or folders in the user directory

      • AnyDesk.exe (PID: 2160)
      • e.exe (PID: 2960)
    • Reads CPU info

      • AnyDesk.exe (PID: 2160)
    • Manual execution by a user

      • e.exe (PID: 2960)
      • wmpnscfg.exe (PID: 2376)
    • Reads Environment values

      • e.exe (PID: 2960)
    • Create files in a temporary directory

      • e.exe (PID: 2960)
    • Reads the software policy settings

      • e.exe (PID: 2960)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(2960) e.exe
C2https://pastebin.com/raw/DCDbfnXJ:<123456789>
Keys
AES<Xwormmm>
Options
Splitter3
Sleep timeUpdate
USB drop nameUSB.exe
MutexOJVrOe6LoguaBFNG
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:01:27 18:04:37+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 10752
InitializedDataSize: 5185024
UninitializedDataSize: 19132416
EntryPoint: 0x3653
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 8.0.8.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: AnyDesk Software GmbH
FileDescription: AnyDesk
FileVersion: 8.0.8
ProductName: AnyDesk
ProductVersion: 8
LegalCopyright: (C) 2022 AnyDesk Software GmbH
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
12
Malicious processes
1
Suspicious processes
5

Behavior graph

Click at the process to see the details
start anydesk.exe no specs anydesk.exe anydesk.exe no specs #XWORM e.exe powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs schtasks.exe no specs wmpnscfg.exe no specs dllhost.exe no specs dllhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
492"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Local\Temp\dllhost.exe'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exee.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
948C:\Users\admin\AppData\Local\Temp\dllhost.exe C:\Users\admin\AppData\Local\Temp\dllhost.exetaskeng.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1380C:\Users\admin\AppData\Local\Temp\dllhost.exe C:\Users\admin\AppData\Local\Temp\dllhost.exetaskeng.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1608"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "dllhost" /tr "C:\Users\admin\AppData\Local\Temp\dllhost.exe"C:\Windows\System32\schtasks.exee.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
2160"C:\Users\admin\AppData\Local\Temp\AnyDesk.exe" C:\Users\admin\AppData\Local\Temp\AnyDesk.exeexplorer.exe
User:
admin
Company:
AnyDesk Software GmbH
Integrity Level:
MEDIUM
Description:
AnyDesk
Exit code:
0
Version:
8.0.8
Modules
Images
c:\users\admin\appdata\local\temp\anydesk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2376"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2488"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'e.exe'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exee.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2960"C:\Users\admin\Desktop\e.exe" C:\Users\admin\Desktop\e.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
XWorm
(PID) Process(2960) e.exe
C2https://pastebin.com/raw/DCDbfnXJ:<123456789>
Keys
AES<Xwormmm>
Options
Splitter3
Sleep timeUpdate
USB drop nameUSB.exe
MutexOJVrOe6LoguaBFNG
3068"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\admin\Desktop\e.exe'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exee.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3224"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'dllhost.exe'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exee.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
Total events
18 258
Read events
18 185
Write events
70
Delete events
3

Modification events

(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASMANCS
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2960) e.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\e_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
Executable files
2
Suspicious files
16
Text files
4
Unknown types
2

Dropped files

PID
Process
Filename
Type
3732AnyDesk.exeC:\Users\admin\AppData\Local\Temp\gcapi.dllexecutable
MD5:1CE7D5A1566C8C449D0F6772A8C27900
SHA256:73170761D6776C0DEBACFBBC61B6988CB8270A20174BF5C049768A264BB8FFAF
2160AnyDesk.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms~RF186cfd.TMPbinary
MD5:7E7AEF2C205FF9603921888429712A7F
SHA256:3D2BE455CA900E5C5CE52A8928E5B2963E05DAB6D369E4060E1E5C2AF90BEB20
2160AnyDesk.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9DO38S1DL3BQFDDXF52H.tempbinary
MD5:7E7AEF2C205FF9603921888429712A7F
SHA256:3D2BE455CA900E5C5CE52A8928E5B2963E05DAB6D369E4060E1E5C2AF90BEB20
3732AnyDesk.exeC:\Users\admin\AppData\Roaming\AnyDesk\system.conftext
MD5:0C04AD1083DC5C7C45E3EE2CD344AE38
SHA256:6452273C017DB7CBE0FFC5B109BBF3F8D3282FB91BFA3C5EABC4FB8F1FC98CB0
2160AnyDesk.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms~RF186d1c.TMPbinary
MD5:5AA0BC08E541401E27132F203C647CCD
SHA256:451F9232B6A138FC410119D027346F22A218840F3B51635C21C308FC49F7CCB7
3732AnyDesk.exeC:\Users\admin\AppData\Roaming\AnyDesk\service.conftext
MD5:5DE2251DA77D4B157FAF33BCF28C9DD0
SHA256:5FB22C5B695757CC7931CE3F85365863E2D5F92AB1CE79DC027A8BC7F6B6F6B8
2160AnyDesk.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2LEDBU2Y5E6XVYE06909.tempbinary
MD5:5AA0BC08E541401E27132F203C647CCD
SHA256:451F9232B6A138FC410119D027346F22A218840F3B51635C21C308FC49F7CCB7
2160AnyDesk.exeC:\Users\admin\AppData\Roaming\AnyDesk\user.conftext
MD5:A787C308BD30D6D844E711D7579BE552
SHA256:8A395011A6A877D3BDD53CC8688EF146160DAB9D42140EB4A70716AD4293A440
3068powershell.exeC:\Users\admin\AppData\Local\Temp\r1o3jcnb.zko.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3068powershell.exeC:\Users\admin\AppData\Local\Temp\t4q3ot55.pp2.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
37
DNS requests
7
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2960
e.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
text
6 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3732
AnyDesk.exe
57.128.101.77:443
boot.net.anydesk.com
OVH SAS
FR
unknown
3732
AnyDesk.exe
208.115.231.30:443
relay-52515283.net.anydesk.com
LIMESTONENETWORKS
US
unknown
2960
e.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown
2960
e.exe
104.20.67.143:443
pastebin.com
CLOUDFLARENET
unknown
2960
e.exe
3.125.102.39:11254
0.tcp.eu.ngrok.io
AMAZON-02
DE
unknown
2960
e.exe
3.125.209.94:11254
0.tcp.eu.ngrok.io
AMAZON-02
DE
unknown
2960
e.exe
18.192.31.165:11254
0.tcp.eu.ngrok.io
AMAZON-02
DE
malicious

DNS requests

Domain
IP
Reputation
boot.net.anydesk.com
  • 57.128.101.77
unknown
relay-52515283.net.anydesk.com
  • 208.115.231.30
unknown
ip-api.com
  • 208.95.112.1
shared
pastebin.com
  • 104.20.67.143
  • 104.20.68.143
  • 172.67.34.170
shared
0.tcp.eu.ngrok.io
  • 3.125.102.39
  • 3.125.209.94
  • 18.192.31.165
malicious

Threats

PID
Process
Class
Message
3732
AnyDesk.exe
Misc activity
ET POLICY SSL/TLS Certificate Observed (AnyDesk Remote Desktop Software)
2960
e.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
2960
e.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
2960
e.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
1080
svchost.exe
Misc activity
ET INFO DNS Query to a *.ngrok domain (ngrok.io)
2960
e.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
1080
svchost.exe
Misc activity
ET INFO DNS Query to a *.ngrok domain (ngrok.io)
2960
e.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
1080
svchost.exe
Misc activity
ET INFO DNS Query to a *.ngrok domain (ngrok.io)
No debug info