File name:

Xworm-V6.1.zip

Full analysis: https://app.any.run/tasks/3478c9eb-cde4-45e0-9786-60665cc998d2
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: April 22, 2025, 02:10:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
crypto-regex
xworm
ip-check
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

75B715E998C88F168728E27DC6887819

SHA1:

2D4D3F9702C0CD8B89B1B1D61CE05AA5C4B430D1

SHA256:

76F7A5D79B8DF10DEC30DC9FAF6CBB6039FDE1B93BD74210A61BF0943931F09D

SSDEEP:

196608:S8kZyVuCHkRCUahNUQM9Hkav2D/e2sL8LwRxy1Iirs4e4dTRIj6:S8k4Hyah+Q4HkaK08Lw4Id4ekTRIm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5244)
    • XWORM has been detected (YARA)

      • Xworm V6.1.exe (PID: 5596)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 5244)
    • The process checks if it is being run in the virtual environment

      • Xworm V6.1.exe (PID: 5596)
    • Found regular expressions for crypto-addresses (YARA)

      • Xworm V6.1.exe (PID: 5596)
    • There is functionality for capture public ip (YARA)

      • Xworm V6.1.exe (PID: 5596)
    • There is functionality for taking screenshot (YARA)

      • Xworm V6.1.exe (PID: 5596)
  • INFO

    • Reads the computer name

      • Xworm V6.1.exe (PID: 5596)
    • Manual execution by a user

      • Xworm V6.1.exe (PID: 5596)
    • Checks supported languages

      • Xworm V6.1.exe (PID: 5596)
    • Reads the machine GUID from the registry

      • Xworm V6.1.exe (PID: 5596)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:08:11 17:19:14
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Xworm-V6.1/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs #XWORM xworm v6.1.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
896C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5244"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Xworm-V6.1.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5596"C:\Users\admin\Desktop\Xworm-V6.1\Xworm V6.1.exe" C:\Users\admin\Desktop\Xworm-V6.1\Xworm V6.1.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
XWorm
Exit code:
0
Version:
5.6.0.0
Modules
Images
c:\users\admin\desktop\xworm-v6.1\xworm v6.1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
3 509
Read events
3 497
Write events
12
Delete events
0

Modification events

(PID) Process:(5244) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5244) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5244) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5244) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Xworm-V6.1.zip
(PID) Process:(5244) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5244) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5244) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5244) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5596) Xworm V6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\XWorm
Operation:writeName:License
Value:
@UnknownHat127001
(PID) Process:(5596) Xworm V6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\XWorm
Operation:writeName:Port
Value:
7000
Executable files
48
Suspicious files
51
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\FastColoredTextBox.dllexecutable
MD5:B746707265772B362C0BA18D8D630061
SHA256:3701B19CCDAC79B880B197756A972027E2AC609EBED36753BD989367EA4EF519
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\GMap.NET.Core.dllexecutable
MD5:819352EA9E832D24FC4CEBB2757A462B
SHA256:58C755FCFC65CDDEA561023D736E8991F0AD69DA5E1378DEA59E98C5DB901B86
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\GeoIP.datbinary
MD5:8EF41798DF108CE9BD41382C9721B1C9
SHA256:BC07FF22D4EE0B6FAFCC12482ECF2981C172A672194C647CEDF9B4D215AD9740
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\Icons\icon (12).icoimage
MD5:4EA9AB789F5AE96766E3F64C8A4E2480
SHA256:84B48CA52DFCD7C74171CF291D2EF1247C3C7591A56B538083834D82857FEE50
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\Icons\icon (1).icoimage
MD5:4F409511E9F93F175CD18187379E94CB
SHA256:115F0DB669B624D0A7782A7CFAF6E7C17282D88DE3A287855DBD6FE0F8551A8F
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\Fixer.battext
MD5:2DABC46CE85AAFF29F22CD74EC074F86
SHA256:A11703FD47D16020FA099A95BB4E46247D32CF8821DC1826E77A971CDD3C4C55
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\Guna.UI2.dllexecutable
MD5:BCC0FE2B28EDD2DA651388F84599059B
SHA256:C6264665A882E73EB2262A74FEA2C29B1921A9AF33180126325FB67A851310EF
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\GMap.NET.WindowsForms.dllexecutable
MD5:32A8742009FFDFD68B46FE8FD4794386
SHA256:741E1A8F05863856A25D101BD35BF97CBA0B637F0C04ECB432C1D85A78EF1365
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\IconExtractor.dllexecutable
MD5:640D8FFA779C6DD5252A262E440C66C0
SHA256:440912D85D2F98BB4F508AB82847067C18E1E15BE0D8ECDCFF0CC19327527FC2
5244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5244.16993\Xworm-V6.1\Xworm-V6.1\Icons\icon (11).icoimage
MD5:1C2CEA154DEEDC5A39DAEC2F1DADF991
SHA256:3B64B79E4092251EBF090164CD2C4815390F34849BBD76FB51085B6A13301B6D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.192.18.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.86.11.11:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6388
SIHClient.exe
GET
200
23.192.18.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6388
SIHClient.exe
GET
200
23.192.18.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.192.18.101:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.86.11.11:80
ocsp.digicert.com
AKAMAI-AS
SE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3812
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.192.18.101
whitelisted
google.com
  • 142.250.185.206
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.23
  • 20.190.159.64
  • 40.126.31.130
  • 20.190.159.4
  • 40.126.31.73
  • 20.190.159.129
  • 20.190.159.0
whitelisted
ocsp.digicert.com
  • 184.86.11.11
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info