File name:

4444.exe

Full analysis: https://app.any.run/tasks/4fbec52b-bd41-4410-846c-1c848a564490
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: October 16, 2024, 22:44:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
xworm
dyndns
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

79600FE99A28223D28F581DFAC72B90A

SHA1:

1A211F8E7AF5E0076D17CC3725DABA1668CCD0D0

SHA256:

623D7ED432AB9D2C01FEC9C0EAD32D962602027DD947BB59EE7C86B923A9CB35

SSDEEP:

24576:13HzLnqOaNMCFJ6kPvOxrcg0i7uF3LsB4sE:13HzLnqOaNMCFJ6kPvO1cg0i7UsB4sE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 4444.exe (PID: 5084)
    • XWORM has been detected (YARA)

      • ._cache_4444.exe (PID: 5036)
    • Connects to the CnC server

      • Synaptics.exe (PID: 7032)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 4444.exe (PID: 5084)
      • Synaptics.exe (PID: 7032)
    • Executable content was dropped or overwritten

      • 4444.exe (PID: 5084)
    • Checks for external IP

      • svchost.exe (PID: 2172)
      • ._cache_4444.exe (PID: 5036)
    • Contacting a server suspected of hosting an CnC

      • Synaptics.exe (PID: 7032)
    • Connects to unusual port

      • ._cache_4444.exe (PID: 5036)
    • There is functionality for communication over UDP network (YARA)

      • Synaptics.exe (PID: 7032)
    • There is functionality for taking screenshot (YARA)

      • Synaptics.exe (PID: 7032)
    • There is functionality for communication dyndns network (YARA)

      • Synaptics.exe (PID: 7032)
    • Checks Windows Trust Settings

      • Synaptics.exe (PID: 7032)
  • INFO

    • Reads the computer name

      • 4444.exe (PID: 5084)
      • ._cache_4444.exe (PID: 5036)
      • Synaptics.exe (PID: 7032)
    • Checks supported languages

      • 4444.exe (PID: 5084)
      • ._cache_4444.exe (PID: 5036)
      • Synaptics.exe (PID: 7032)
    • Create files in a temporary directory

      • 4444.exe (PID: 5084)
      • Synaptics.exe (PID: 7032)
    • Creates files in the program directory

      • 4444.exe (PID: 5084)
      • Synaptics.exe (PID: 7032)
    • The process uses the downloaded file

      • 4444.exe (PID: 5084)
    • Process checks computer location settings

      • 4444.exe (PID: 5084)
    • Checks proxy server information

      • Synaptics.exe (PID: 7032)
      • ._cache_4444.exe (PID: 5036)
    • Reads Environment values

      • ._cache_4444.exe (PID: 5036)
    • Reads the machine GUID from the registry

      • ._cache_4444.exe (PID: 5036)
      • Synaptics.exe (PID: 7032)
    • Disables trace logs

      • ._cache_4444.exe (PID: 5036)
    • Reads the software policy settings

      • Synaptics.exe (PID: 7032)
    • Creates files or folders in the user directory

      • Synaptics.exe (PID: 7032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(5036) ._cache_4444.exe
C2sniper.ddns.net:7771
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexGNFRKlnCQKArAD5P
No Malware configuration.

TRiD

.exe | Win32 Executable Borland Delphi 7 (96.4)
.exe | Win32 Executable Delphi generic (2)
.exe | Win32 Executable (generic) (0.6)
.exe | Win16/32 Executable Delphi generic (0.3)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 629760
InitializedDataSize: 288256
UninitializedDataSize: -
EntryPoint: 0x9ab80
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.4
ProductVersionNumber: 1.0.0.4
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Turkish
CharacterSet: Windows, Turkish
CompanyName: Synaptics
FileDescription: Synaptics Pointing Device Driver
FileVersion: 1.0.0.4
InternalName: -
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: -
ProductName: Synaptics Pointing Device Driver
ProductVersion: 1.0.0.0
Comments: -
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 4444.exe #XWORM ._cache_4444.exe THREAT synaptics.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5036"C:\Users\admin\AppData\Local\Temp\._cache_4444.exe" C:\Users\admin\AppData\Local\Temp\._cache_4444.exe
4444.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\._cache_4444.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(5036) ._cache_4444.exe
C2sniper.ddns.net:7771
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexGNFRKlnCQKArAD5P
5084"C:\Users\admin\AppData\Local\Temp\4444.exe" C:\Users\admin\AppData\Local\Temp\4444.exe
explorer.exe
User:
admin
Company:
Synaptics
Integrity Level:
MEDIUM
Description:
Synaptics Pointing Device Driver
Exit code:
0
Version:
1.0.0.4
Modules
Images
c:\users\admin\appdata\local\temp\4444.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7032"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdateC:\ProgramData\Synaptics\Synaptics.exe
4444.exe
User:
admin
Company:
Synaptics
Integrity Level:
HIGH
Description:
Synaptics Pointing Device Driver
Version:
1.0.0.4
Modules
Images
c:\programdata\synaptics\synaptics.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
2 828
Read events
2 808
Write events
20
Delete events
0

Modification events

(PID) Process:(5084) 4444.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(5084) 4444.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Synaptics Pointing Device Driver
Value:
C:\ProgramData\Synaptics\Synaptics.exe
(PID) Process:(5084) 4444.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
Operation:writeName:LastUpdate
Value:
D541106700000000
(PID) Process:(5036) ._cache_4444.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5036) ._cache_4444.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5036) ._cache_4444.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5036) ._cache_4444.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5036) ._cache_4444.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5036) ._cache_4444.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5036) ._cache_4444.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
4
Suspicious files
8
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7032Synaptics.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_3459237E893F04A4596206DC25825D64binary
MD5:984DE233BC45F5C187951371F0D8E97D
SHA256:EB9F23473BA76599FC14F44A735BA68050AF9A352C470E6611D9D7DCD15862DD
7032Synaptics.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_3459237E893F04A4596206DC25825D64binary
MD5:4A0B0E29EC7C924CC02C1C802DD8AA8B
SHA256:BF61BC9DF8177E0034CD363F1E5CAE173658E8AE6A141B01ABA5A33652C8EC12
50844444.exeC:\ProgramData\Synaptics\RCXBBA8.tmpexecutable
MD5:7103F3EEC43BBABE34068295157F9F1C
SHA256:2B6DB5563D77C827F5A662CB0A05359450DB29948863F9A5556C19CE14D05305
50844444.exeC:\ProgramData\Synaptics\Synaptics.exeexecutable
MD5:79600FE99A28223D28F581DFAC72B90A
SHA256:623D7ED432AB9D2C01FEC9C0EAD32D962602027DD947BB59EE7C86B923A9CB35
50844444.exeC:\Users\admin\AppData\Local\Temp\._cache_4444.exeexecutable
MD5:9F5DE24FCE13D71E9D801FED3B69FD91
SHA256:8D92832C9CBBC378FB3E76C3A5F60900DD60A9478E5EFD074E26BF2863E3C4DC
7032Synaptics.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:D3DC0F65279CB4A2F4A006FF97ED408C
SHA256:C7D93D3240DD4220D34B24D8044F9ADCD45E3B4DB96C8C7747A510C0C2A2ED9F
7032Synaptics.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_B60DAD4239F8DBB7FDA230724F9F9DFDbinary
MD5:C5540184A62B9E17BF8FAA14126124EB
SHA256:2DF2A55C54922B97561A848F382F0F19189EDBB0A96629C7721F70BE2614F747
7032Synaptics.exeC:\Users\admin\AppData\Local\Temp\snNh5Fd.inihtml
MD5:D976956F662D4B694A185A431A00555E
SHA256:37D238233582AD548EB5FBF619D202C55A629BDE79BE23EB59FC82B0BA418B47
7032Synaptics.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_B60DAD4239F8DBB7FDA230724F9F9DFDder
MD5:48B8E0C787F160B7881A764817F62CE0
SHA256:2D9E899530ECA21A0E89156FA69DDF668ADF0D31E3F5A14BE028DD61839E29E0
7032Synaptics.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:7213F0C15AA8C1B16CE68BBE7F32C5C4
SHA256:7D390BB2094490CABF9913228A9461EE0CED4413DA2496C3582A11603832FC53
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
71
DNS requests
29
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7032
Synaptics.exe
GET
200
69.42.215.252:80
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
unknown
whitelisted
5036
._cache_4444.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
5488
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4700
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7300
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5948
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7300
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7032
Synaptics.exe
GET
200
172.217.16.131:80
http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEA9JpqgM5UQeCW2Pd5ZZ%2Fzc%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7048
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4360
SearchApp.exe
104.126.37.145:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.bing.com
  • 104.126.37.145
  • 104.126.37.131
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.186.78
whitelisted
xred.mooo.com
whitelisted
freedns.afraid.org
  • 69.42.215.252
malicious
ip-api.com
  • 208.95.112.1
shared
login.live.com
  • 40.126.32.72
  • 40.126.32.68
  • 40.126.32.138
  • 40.126.32.74
  • 40.126.32.134
  • 20.190.160.17
  • 40.126.32.76
  • 40.126.32.136
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to Abused Domain *.mooo.com
2172
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
5036
._cache_4444.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
5036
._cache_4444.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2172
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2172
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
2172
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
3 ETPRO signatures available at the full report
No debug info