File name:

Windows Security Health Service.exe

Full analysis: https://app.any.run/tasks/6cf4d747-8a78-493b-9221-48d2e7dfca3a
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: July 17, 2025, 20:28:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
auto-startup
xworm
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

6EEA711EE3D1BC98AAE844B8DC437025

SHA1:

093B17C38930F02C9B4C5F0C3AC67EF6F045B0DF

SHA256:

63511BA19B0E8009E11ABEA3B913A708059F131D00969BC985DB69097803AC7A

SSDEEP:

768:z3EaG4yMSLsrV1dpOB020JoVoc6JF5PL9OCJD6QO7hFi34:gaGJLsrVE30Jo96Fx9tR6QO7S4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • Windows Security Health Service.exe (PID: 5552)
    • XWORM has been detected (YARA)

      • Windows Security Health Service.exe (PID: 5552)
    • XWORM has been detected (SURICATA)

      • Windows Security Health Service.exe (PID: 5552)
  • SUSPICIOUS

    • Checks for external IP

      • Windows Security Health Service.exe (PID: 5552)
      • svchost.exe (PID: 2200)
    • Executable content was dropped or overwritten

      • Windows Security Health Service.exe (PID: 5552)
    • Contacting a server suspected of hosting an CnC

      • Windows Security Health Service.exe (PID: 5552)
    • Connects to unusual port

      • Windows Security Health Service.exe (PID: 5552)
  • INFO

    • Checks supported languages

      • Windows Security Health Service.exe (PID: 5552)
    • Reads the machine GUID from the registry

      • Windows Security Health Service.exe (PID: 5552)
    • Disables trace logs

      • Windows Security Health Service.exe (PID: 5552)
    • Reads Environment values

      • Windows Security Health Service.exe (PID: 5552)
    • Reads the computer name

      • Windows Security Health Service.exe (PID: 5552)
    • Checks proxy server information

      • Windows Security Health Service.exe (PID: 5552)
      • slui.exe (PID: 3052)
    • Creates files in the program directory

      • Windows Security Health Service.exe (PID: 5552)
    • Creates files or folders in the user directory

      • Windows Security Health Service.exe (PID: 5552)
    • Launching a file from the Startup directory

      • Windows Security Health Service.exe (PID: 5552)
    • Reads the software policy settings

      • slui.exe (PID: 3052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(5552) Windows Security Health Service.exe
C245.141.26.28:5000
Keys
AES<953954523>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexxNtTKfuf9GP6YZDP
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:07:04 12:39:57+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 38912
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0xb6ce
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: Windows Security Health Service.exe
LegalCopyright:
OriginalFileName: Windows Security Health Service.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XWORM windows security health service.exe svchost.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3052C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5552"C:\Users\admin\AppData\Local\Temp\Windows Security Health Service.exe" C:\Users\admin\AppData\Local\Temp\Windows Security Health Service.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\windows security health service.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(5552) Windows Security Health Service.exe
C245.141.26.28:5000
Keys
AES<953954523>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexxNtTKfuf9GP6YZDP
Total events
2 108
Read events
2 094
Write events
14
Delete events
0

Modification events

(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5552) Windows Security Health Service.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Security Health Service_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
0
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
5552Windows Security Health Service.exeC:\ProgramData\Windows Security Health Service.exeexecutable
MD5:6EEA711EE3D1BC98AAE844B8DC437025
SHA256:63511BA19B0E8009E11ABEA3B913A708059F131D00969BC985DB69097803AC7A
5552Windows Security Health Service.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.lnklnk
MD5:F0A7F194C794E442429904D4DDCA6628
SHA256:E665914F5FA5586A0B098522CE13D5F04600A9B58B953A46AA42E4B0FA7BB598
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
26
DNS requests
18
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5552
Windows Security Health Service.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.110.193:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2220
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2940
svchost.exe
GET
200
2.23.197.184:80
http://x1.c.lencr.org/
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2460
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2220
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2040
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5552
Windows Security Health Service.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted
2460
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2460
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5552
Windows Security Health Service.exe
45.141.26.28:5000
NL
unknown
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.142
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
login.live.com
  • 20.190.160.128
  • 40.126.32.140
  • 40.126.32.133
  • 20.190.160.17
  • 20.190.160.20
  • 20.190.160.66
  • 40.126.32.138
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 23.55.110.193
  • 23.55.110.211
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 69.192.161.161
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
5552
Windows Security Health Service.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
5552
Windows Security Health Service.exe
A Network Trojan was detected
ET MALWARE Common Stealer Behavior - Source IP Associated with Hosting Provider Check via ip.api .com
5552
Windows Security Health Service.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
2200
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
5552
Windows Security Health Service.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
No debug info