File name:

INFORME TRANSACCIONAL - DAVIVIENDA.zip

Full analysis: https://app.any.run/tasks/86a42866-e7d1-4464-bd43-78267c322e6a
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: December 10, 2024, 17:09:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
xworm
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

1A5729C82BFBA717D8C308FFA1F080ED

SHA1:

201D8C2D2772960F721BA6D9E7F739750C4CBED5

SHA256:

723169FB85AFB81819F2C6A6FA9D76958E6F3464977327AC725EB3D5040AEEFE

SSDEEP:

24576:hiN1Kp4Qb6JzaO3kYszlML5gZpC5E5nNYt/XBPtGlO9XrgpVdAZZp:hibKp4Qb6FaO3kYglA5gvC5E5nNYt/Xv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XWORM has been detected (YARA)

      • csc.exe (PID: 6948)
    • Starts Visual C# compiler

      • INFORME TRANSACCIONAL - DAVIVIENDA.exe (PID: 6892)
    • Connects to the CnC server

      • csc.exe (PID: 6948)
    • XWORM has been detected (SURICATA)

      • csc.exe (PID: 6948)
    • Changes the autorun value in the registry

      • INFORME TRANSACCIONAL - DAVIVIENDA.exe (PID: 6892)
  • SUSPICIOUS

    • Connects to unusual port

      • csc.exe (PID: 6948)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 3608)
    • Contacting a server suspected of hosting an CnC

      • csc.exe (PID: 6948)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 3608)
    • Reads the computer name

      • csc.exe (PID: 6948)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 3608)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3608)
    • Checks supported languages

      • INFORME TRANSACCIONAL - DAVIVIENDA.exe (PID: 6892)
      • csc.exe (PID: 6948)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 6948)
    • Create files in a temporary directory

      • csc.exe (PID: 6948)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(6948) csc.exe
C287.120.116.179:1300
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop name10-12-24
MutexzgWD0vmDa5PBLlFR
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2024:12:10 07:55:48
ZipCRC: 0xdd7e100f
ZipCompressedSize: 543515
ZipUncompressedSize: 1923584
ZipFileName: INFORME TRANSACCIONAL - DAVIVIENDA.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe informe transaccional - davivienda.exe #XWORM csc.exe

Process information

PID
CMD
Path
Indicators
Parent process
3608"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\INFORME TRANSACCIONAL - DAVIVIENDA.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6892"C:\Users\admin\AppData\Local\Temp\Rar$EXb3608.39372\INFORME TRANSACCIONAL - DAVIVIENDA.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3608.39372\INFORME TRANSACCIONAL - DAVIVIENDA.exe
WinRAR.exe
User:
admin
Company:
Electronic Arts
Integrity Level:
MEDIUM
Description:
OriginLegacyCLI
Exit code:
0
Version:
8,1,1,1591
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3608.39372\informe transaccional - davivienda.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6948"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
INFORME TRANSACCIONAL - DAVIVIENDA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
XWorm
(PID) Process(6948) csc.exe
C287.120.116.179:1300
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop name10-12-24
MutexzgWD0vmDa5PBLlFR
Total events
2 359
Read events
2 349
Write events
10
Delete events
0

Modification events

(PID) Process:(3608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(3608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(3608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(3608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\INFORME TRANSACCIONAL - DAVIVIENDA.zip
(PID) Process:(3608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6892) INFORME TRANSACCIONAL - DAVIVIENDA.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:OrionLegacyCLI
Value:
C:\Users\admin\Videos\OrionLegacy\Bin\OrionLegacyCLI.exe
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6892INFORME TRANSACCIONAL - DAVIVIENDA.exeC:\Users\admin\Videos\OrionLegacy\Bin\OrionLegacyCLI.exe
MD5:
SHA256:
6948csc.exeC:\Users\admin\AppData\Local\Temp\Log.tmptext
MD5:CF25B9F9687554F01F9BB12FB540A760
SHA256:1AAB24FCE82DBB853F6824D2D061ECDB5DAD7E0970E68B8C5014965C2C953A02
3608WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3608.39372\INFORME TRANSACCIONAL - DAVIVIENDA.exeexecutable
MD5:8FC71D0EE5B9F81180261C7228297DBA
SHA256:2BAF9B0FF18B826F394498385D0AC66B241CD55C9E35822F50C97EC33ED8DF8E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
34
DNS requests
18
Threats
68

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4652
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6976
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6324
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4652
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6976
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4652
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4652
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.23.209.176:443
www.bing.com
Akamai International B.V.
GB
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 142.250.186.110
whitelisted
www.bing.com
  • 2.23.209.176
  • 2.23.209.161
  • 2.23.209.189
  • 2.23.209.185
  • 2.23.209.158
  • 2.23.209.148
  • 2.23.209.150
  • 2.23.209.177
  • 2.23.209.193
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.64
  • 40.126.31.67
  • 40.126.31.71
  • 20.190.159.75
  • 20.190.159.4
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted

Threats

Found threats are available for the paid subscriptions
68 ETPRO signatures available at the full report
No debug info