File name:

DeltaLoader.exe

Full analysis: https://app.any.run/tasks/0a71e88e-429c-4ac0-a4db-0f89c500ec2e
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: February 22, 2025, 20:49:22
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
remote
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

327CBD3297C931BFF953566BA0BBEBBF

SHA1:

A2996DF051972463DEF6653E8A38E98067AC5003

SHA256:

7B10ED456120968A2E78F483059DCFDE4ABD8A7480B04168D0ED2C9FA022EBB6

SSDEEP:

12288:sCES/ixEn1ckIGtZ2u3shuX+tLaZGmVtuxZVVVVVVVVVAtVVV529bM+2dI:sCN62xltoLaZGmVtuxP9bM+2q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • delta.exe (PID: 6656)
    • Create files in the Startup directory

      • delta.exe (PID: 6656)
    • XWORM has been detected (YARA)

      • delta.exe (PID: 6656)
    • XWORM has been detected (SURICATA)

      • delta.exe (PID: 6656)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • DeltaLoader.exe (PID: 6556)
    • Reads the date of Windows installation

      • DeltaLoader.exe (PID: 6556)
    • Executable content was dropped or overwritten

      • DeltaLoader.exe (PID: 6556)
      • delta.exe (PID: 6656)
    • There is functionality for taking screenshot (YARA)

      • DeltaLoader.exe (PID: 6556)
    • Connects to unusual port

      • delta.exe (PID: 6656)
    • Contacting a server suspected of hosting an CnC

      • delta.exe (PID: 6656)
  • INFO

    • Create files in a temporary directory

      • DeltaLoader.exe (PID: 6556)
    • Reads the computer name

      • delta.exe (PID: 6656)
      • DeltaLoader.exe (PID: 6556)
    • Checks supported languages

      • DeltaLoader.exe (PID: 6556)
      • delta.exe (PID: 6656)
    • Process checks computer location settings

      • DeltaLoader.exe (PID: 6556)
    • Reads the machine GUID from the registry

      • delta.exe (PID: 6656)
    • Creates files or folders in the user directory

      • delta.exe (PID: 6656)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(6656) delta.exe
C2127.0.0.1,inside-hosting.gl.at.ply.gg:16905
Keys
AESmiron228
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexUvtbFcVFhD9LwZBk
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:16 11:23:01+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 287744
InitializedDataSize: 207872
UninitializedDataSize: -
EntryPoint: 0x327b0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start deltaloader.exe #XWORM delta.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6556"C:\Users\admin\AppData\Local\Temp\DeltaLoader.exe" C:\Users\admin\AppData\Local\Temp\DeltaLoader.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\deltaloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6656"C:\Users\admin\AppData\Local\Temp\RarSFX0\delta.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\delta.exe
DeltaLoader.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\delta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(6656) delta.exe
C2127.0.0.1,inside-hosting.gl.at.ply.gg:16905
Keys
AESmiron228
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexUvtbFcVFhD9LwZBk
Total events
1 287
Read events
1 286
Write events
1
Delete events
0

Modification events

(PID) Process:(6656) delta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:XClient
Value:
C:\Users\admin\AppData\Roaming\XClient.exe
Executable files
2
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6556DeltaLoader.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Delta.battext
MD5:44E255905C650C5E755D8ED48C2F1147
SHA256:5CA747548065736F0EF92472601B600DC341C7A1E638039F26DE51C2922F38E7
6656delta.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkbinary
MD5:8683649B00C9FBB44DF6962D0E7830BF
SHA256:CEAC059F4FB486B185698525BEFB4DFD2F9B2E3FE30E9F7CBB7A2C2AD2AE94C5
6556DeltaLoader.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\delta.exeexecutable
MD5:545CEF0D741D8F9FBBBA7118E3B7875F
SHA256:74D95891041C9C41A5B3ECE774678ABC6FBFF470699C0C783E468221D716EE4F
6656delta.exeC:\Users\admin\AppData\Roaming\XClient.exeexecutable
MD5:545CEF0D741D8F9FBBBA7118E3B7875F
SHA256:74D95891041C9C41A5B3ECE774678ABC6FBFF470699C0C783E468221D716EE4F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
31
DNS requests
18
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6420
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6420
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6292
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.19.96.120:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
2.19.106.8:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
2632
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.219.150.101
whitelisted
google.com
  • 142.250.186.142
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.4
  • 40.126.31.131
  • 20.190.159.130
  • 20.190.159.129
  • 40.126.31.2
  • 40.126.31.129
  • 40.126.31.128
whitelisted
www.bing.com
  • 2.19.96.120
  • 2.19.96.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
go.microsoft.com
  • 2.19.106.8
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Suspected domain Associated with Malware Distribution (.ply .gg)
2192
svchost.exe
Misc activity
ET TA_ABUSED_SERVICES Tunneling Service in DNS Lookup (* .ply .gg)
2192
svchost.exe
Potentially Bad Traffic
ET INFO playit .gg Tunneling Domain in DNS Lookup
6656
delta.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
No debug info