download:

/al3asriah/W-DAX/raw/main/D%20WAX.exe

Full analysis: https://app.any.run/tasks/da5268b1-b8ec-4de6-9e30-8436242fa66d
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 02, 2023, 13:51:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
xworm
remote
ransomware
found-by-newdark
nitroransomware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

72B51E28589FBEAC9400380DDDEDB79A

SHA1:

4D14AB35E4425A8B1B1B655C2178B0EA2522E7F0

SHA256:

6CA01F81CC92345981212659AA05D5595A45E96A1F4A6F8678D21F1D24C96AA0

SSDEEP:

6144:/qkoB3pcFOKc4sFyYl1vuBMF7inx9fm5/VZLYS9fmIC:St3OFOKc4jeluBMF7gvmH5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • da5268b1-b8ec-4de6-9e30-8436242fa66d.exe (PID: 2412)
      • SECURITY AVAST.exe (PID: 2624)
    • Actions looks like stealing of personal data

      • NitroRansomware.exe (PID: 2780)
    • Create files in the Startup directory

      • SECURITY AVAST.exe (PID: 2624)
    • XWORM has been detected (YARA)

      • SECURITY AVAST.exe (PID: 2624)
    • Connects to the CnC server

      • SECURITY AVAST.exe (PID: 2624)
    • XWORM has been detected (SURICATA)

      • SECURITY AVAST.exe (PID: 2624)
  • SUSPICIOUS

    • Reads the Internet Settings

      • da5268b1-b8ec-4de6-9e30-8436242fa66d.exe (PID: 2412)
      • WMIC.exe (PID: 2528)
      • NitroRansomware.exe (PID: 2780)
    • Starts CMD.EXE for commands execution

      • NitroRansomware.exe (PID: 2780)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 1556)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 2528)
    • Connects to unusual port

      • SECURITY AVAST.exe (PID: 2624)
  • INFO

    • Reads the machine GUID from the registry

      • da5268b1-b8ec-4de6-9e30-8436242fa66d.exe (PID: 2412)
      • SECURITY AVAST.exe (PID: 2624)
      • NitroRansomware.exe (PID: 2780)
    • Create files in a temporary directory

      • da5268b1-b8ec-4de6-9e30-8436242fa66d.exe (PID: 2412)
      • NitroRansomware.exe (PID: 2780)
    • Reads the computer name

      • da5268b1-b8ec-4de6-9e30-8436242fa66d.exe (PID: 2412)
      • SECURITY AVAST.exe (PID: 2624)
      • NitroRansomware.exe (PID: 2780)
      • wmpnscfg.exe (PID: 2764)
    • Checks supported languages

      • da5268b1-b8ec-4de6-9e30-8436242fa66d.exe (PID: 2412)
      • SECURITY AVAST.exe (PID: 2624)
      • NitroRansomware.exe (PID: 2780)
      • wmpnscfg.exe (PID: 2764)
    • Reads Environment values

      • NitroRansomware.exe (PID: 2780)
    • Creates files or folders in the user directory

      • SECURITY AVAST.exe (PID: 2624)
      • NitroRansomware.exe (PID: 2780)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2764)
      • taskmgr.exe (PID: 3340)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(2624) SECURITY AVAST.exe
C216.ip.gl.ply.gg:59539
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameUSB.exe
Mutexb5dIopJKeYh4Cm4x
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:02 14:07:06+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 181248
InitializedDataSize: 44032
UninitializedDataSize: -
EntryPoint: 0x2e34e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: D WAX.exe
LegalCopyright:
OriginalFileName: D WAX.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
7
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start da5268b1-b8ec-4de6-9e30-8436242fa66d.exe no specs #XWORM security avast.exe nitroransomware.exe cmd.exe no specs wmic.exe no specs wmpnscfg.exe no specs taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1556"cmd.exe"C:\Windows\System32\cmd.exeNitroRansomware.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2412"C:\Users\admin\Desktop\da5268b1-b8ec-4de6-9e30-8436242fa66d.exe" C:\Users\admin\Desktop\da5268b1-b8ec-4de6-9e30-8436242fa66d.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\da5268b1-b8ec-4de6-9e30-8436242fa66d.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2528wmic csproduct get uuidC:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2624"C:\Users\admin\AppData\Local\Temp\SECURITY AVAST.exe" C:\Users\admin\AppData\Local\Temp\SECURITY AVAST.exe
da5268b1-b8ec-4de6-9e30-8436242fa66d.exe
User:
admin
Company:
Discord Inc.
Integrity Level:
MEDIUM
Description:
Discord - https://discord.com/
Exit code:
0
Version:
1.0.64.0
Modules
Images
c:\users\admin\appdata\local\temp\security avast.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
XWorm
(PID) Process(2624) SECURITY AVAST.exe
C216.ip.gl.ply.gg:59539
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameUSB.exe
Mutexb5dIopJKeYh4Cm4x
2764"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2780"C:\Users\admin\AppData\Local\Temp\NitroRansomware.exe" C:\Users\admin\AppData\Local\Temp\NitroRansomware.exe
da5268b1-b8ec-4de6-9e30-8436242fa66d.exe
User:
admin
Integrity Level:
MEDIUM
Description:
NitroRansomware
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\nitroransomware.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3340"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
2 508
Read events
2 498
Write events
10
Delete events
0

Modification events

(PID) Process:(2412) da5268b1-b8ec-4de6-9e30-8436242fa66d.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2412) da5268b1-b8ec-4de6-9e30-8436242fa66d.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2412) da5268b1-b8ec-4de6-9e30-8436242fa66d.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2412) da5268b1-b8ec-4de6-9e30-8436242fa66d.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3340) taskmgr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\TaskManager
Operation:writeName:UsrColumnSettings
Value:
1C0C0000340400000000000050000000010000001D0C0000350400000000000023000000010000001E0C000036040000000000003C000000010000001F0C000039040000000000004E00000001000000200C000037040000000000004E00000001000000
(PID) Process:(3340) taskmgr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\TaskManager
Operation:writeName:Preferences
Value:
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
Executable files
3
Suspicious files
52
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2780NitroRansomware.exeC:\Users\admin\Pictures\buyinglistings.png.givemenitrobinary
MD5:813E558240024FDE80D3475E74566E53
SHA256:5B8846BB18E9060786A91BDEB116861A8FCE83381252797AD64891B5A761E04C
2780NitroRansomware.exeC:\Users\admin\Documents\beginninguk.rtf.givemenitrobinary
MD5:F5F9B6BCE4F9700811DAC25CA2CAD346
SHA256:A76F74C87DCE96BF927658ADD31FF27DD2DF46067946CFF1D3F1CFE5E12B9B90
2624SECURITY AVAST.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SECURITY AVAST.lnkbinary
MD5:DF0EA7DA0CFE423668A6AC7ECA4BC404
SHA256:54D1F3D3933819794D5647A2217B6F8BE5D2518871D8A75E970E0A5A8C8B06EA
2780NitroRansomware.exeC:\Users\admin\Desktop\desktop.ini.givemenitrobinary
MD5:0F32E9563284FCDF7CE44599EEB3A757
SHA256:680179B9B61035DAA8ADF5C3B30ADEFD1E77CF84F548DDAA6870B3EDCF7832C2
2780NitroRansomware.exeC:\Users\admin\Desktop\announcementsspeed.rtf.givemenitrobinary
MD5:4C621C09A5CEA476F84AD85A2F2E8838
SHA256:8606593738B63AADE5FAC33371FAEFF05BB22B1EA7F9C653AD7492F5F8CA4681
2780NitroRansomware.exeC:\Users\admin\Pictures\treatmentsession.png.givemenitrobinary
MD5:2AC71045111344184C81259C501DBA05
SHA256:DF15747D17681BC7F61B890FD3ED4EE5F35A91F603E2B58E6BE2687AFC81544B
2780NitroRansomware.exeC:\Users\admin\Documents\ratingsdark.rtf.givemenitrobinary
MD5:0D9CC79EF4F2D70A60F3D6039AE8443D
SHA256:F28F4C4B748B1AB592DC44E4E6FD39595FB72C6BDDE36F76843016C61E07B0F4
2780NitroRansomware.exeC:\Users\admin\Pictures\desktop.ini.givemenitrobinary
MD5:9D33991B6D0C99704A6ABA0556047E53
SHA256:DCA7DF5F7284908AE1B71C957FFB2F998E111B4338EE852B4718C66FAF80CC3C
2780NitroRansomware.exeC:\Users\admin\Documents\prostrategy.rtf.givemenitrobinary
MD5:D79192A6889523D731BF5706B4DD555E
SHA256:C08887CDA61FDBA7ED9EAF0FE93154C90115AE05346109FEFA605CB7768505BC
2780NitroRansomware.exeC:\Users\admin\Pictures\nakedrecord.png.givemenitrobinary
MD5:A64E6DD9C9A4EF7205A934F2E46C5C47
SHA256:F045EF412FC18ABB99176B90DCCA59B633B73B057DBD1DE40B64F0072529343D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
12
DNS requests
4
Threats
38

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted
2780
NitroRansomware.exe
104.237.62.212:443
api.ipify.org
WEBNX
US
unknown
2780
NitroRansomware.exe
162.159.138.232:443
discord.com
CLOUDFLARENET
unknown
2624
SECURITY AVAST.exe
147.185.221.16:59539
16.ip.gl.ply.gg
PLAYIT-GG
US
malicious

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 104.237.62.212
  • 173.231.16.77
  • 64.185.227.156
shared
discord.com
  • 162.159.138.232
  • 162.159.136.232
  • 162.159.135.232
  • 162.159.137.232
  • 162.159.128.233
whitelisted
16.ip.gl.ply.gg
  • 147.185.221.16
malicious

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
2780
NitroRansomware.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
1080
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
2780
NitroRansomware.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2780
NitroRansomware.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2780
NitroRansomware.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2780
NitroRansomware.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2624
SECURITY AVAST.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm
2624
SECURITY AVAST.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm
2780
NitroRansomware.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
28 ETPRO signatures available at the full report
No debug info