File name:

7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe

Full analysis: https://app.any.run/tasks/06b2d92a-6557-4604-8792-6c7537fbf22f
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: August 01, 2025, 01:11:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-sch
auto-startup
autoit
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

5EA006803BBA64C15FE68791A8DB5005

SHA1:

F10DD374C76E194C8B7E0381A80DB57281A1E77B

SHA256:

7B232254D4B4BE67111E92F5C2E34BC331403393C2D019B31E256CA7D798CD08

SSDEEP:

24576:zBpF296jwiDP76SZLI5a2/fbqFd0WXbkUzKkUx585GclTDGiyBS1ooBrdGYOZaVj:zBL296jwiDP76SZLI5a2/fbqFd0WXbkQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • cmd.exe (PID: 440)
      • MSBuild.exe (PID: 2220)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 1132)
    • XWORM has been detected (YARA)

      • MSBuild.exe (PID: 2220)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
    • Application launched itself

      • cmd.exe (PID: 1232)
    • Get information on the list of running processes

      • cmd.exe (PID: 2096)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 2096)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2096)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 2096)
    • The executable file from the user directory is run by the CMD process

      • Nation.pif (PID: 2504)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 2096)
    • There is functionality for taking screenshot (YARA)

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • Nation.pif (PID: 2504)
    • Process drops legitimate windows executable

      • MSBuild.exe (PID: 2220)
    • Connects to unusual port

      • MSBuild.exe (PID: 2220)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 1232)
      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
  • INFO

    • Checks supported languages

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • extrac32.exe (PID: 2400)
      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
    • The sample compiled with english language support

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
    • Create files in a temporary directory

      • extrac32.exe (PID: 2400)
      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
    • Manual execution by a user

      • cmd.exe (PID: 1132)
      • cmd.exe (PID: 440)
      • wscript.exe (PID: 4080)
    • Reads the computer name

      • extrac32.exe (PID: 2400)
      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
    • Reads mouse settings

      • Nation.pif (PID: 2504)
    • Creates files or folders in the user directory

      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
    • Launching a file from the Startup directory

      • cmd.exe (PID: 440)
      • MSBuild.exe (PID: 2220)
    • Launching a file from Task Scheduler

      • cmd.exe (PID: 1132)
    • Reads the machine GUID from the registry

      • MSBuild.exe (PID: 2220)
    • Reads the software policy settings

      • slui.exe (PID: 1592)
    • Checks proxy server information

      • slui.exe (PID: 1592)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(2220) MSBuild.exe
C2hexa.dnsframe.com:66
Keys
AES<666>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameinj3ct0r HexaOpen
MutexFzSIsfqlHwWWhS56
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:02:25 04:48:34+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 29696
InitializedDataSize: 491520
UninitializedDataSize: 16896
EntryPoint: 0x3a10
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 31.0.4.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: OBS
FileDescription: OBS Studio
FileVersion: 31.0.4
InternalName: obs
OriginalFileName: obs
ProductName: OBS Studio
ProductVersion: 31.0.4
Comments: Free and open source software for video recording and live streaming
LegalCopyright: (C) Lain Bailey
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
18
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs tasklist.exe no specs findstr.exe no specs extrac32.exe no specs findstr.exe no specs nation.pif waitfor.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe conhost.exe no specs schtasks.exe no specs wscript.exe no specs #XWORM msbuild.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
440cmd /k echo [InternetShortcut] > "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SpectraFox.url" & echo URL="C:\Users\admin\AppData\Local\ColorSync Dynamics\SpectraFox.js" >> "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SpectraFox.url" & exitC:\Windows\SysWOW64\cmd.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
512\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1132cmd /c schtasks.exe /create /tn "Started" /tr "wscript //B 'C:\Users\admin\AppData\Local\ColorSync Dynamics\SpectraFox.js'" /sc minute /mo 5 /FC:\Windows\SysWOW64\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1232cmd.exe /c cmd < Conditions.jpgC:\Windows\SysWOW64\cmd.exe7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1592C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1660schtasks.exe /create /tn "Started" /tr "wscript //B 'C:\Users\admin\AppData\Local\ColorSync Dynamics\SpectraFox.js'" /sc minute /mo 5 /FC:\Windows\SysWOW64\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2096cmd C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2220C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
Nation.pif
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
XWorm
(PID) Process(2220) MSBuild.exe
C2hexa.dnsframe.com:66
Keys
AES<666>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameinj3ct0r HexaOpen
MutexFzSIsfqlHwWWhS56
2400extrac32 /Y Tackle.jpg *.*C:\Windows\SysWOW64\extrac32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® CAB File Extract Utility
Exit code:
0
Version:
5.00 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\extrac32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2504Nation.pif b C:\Users\admin\AppData\Local\Temp\416815\Nation.pif
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Version:
3, 3, 17, 0
Modules
Images
c:\users\admin\appdata\local\temp\416815\nation.pif
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
Total events
4 679
Read events
4 679
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
14
Text files
4
Unknown types
3

Dropped files

PID
Process
Filename
Type
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Brieflybinary
MD5:B554FC9FE8B83DD2C96DB713ADBD7BAD
SHA256:DA91CCA3415C33E34A272F6D647FD8E8095E6ED9828806777B53CD570E599A67
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Magneticbinary
MD5:2644F6413F8DF0D981DB0A74537E896F
SHA256:8A5791B0AAD6F266BA3C7F88721017C49E6A2757D35986300F485ACCCC99F1DF
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Sharkbinary
MD5:419D278BD43FE25DDB79CD1251B7363B
SHA256:68DE54543C1310CCFCEC132B8385C6C250F5C1516AEE0FB9AB3B01AF0AF73426
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Publiclymp3
MD5:3AC9EB1889E273C47027F3692CA0B73F
SHA256:4177B4E03FDF9DC7FCBEAC232311E19552A3E96BED6AA7484ED418C0DB7D22C9
57647b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exeC:\Users\admin\AppData\Local\Temp\Conditions.jpgtext
MD5:77C0B5F0568037478788BC63CB798899
SHA256:C5DF26FD3409CE100BFD79910D231D2064652E18F8987445AA539031175EC7F4
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Tiedbinary
MD5:FEFE1D66C38B1A3A2219A819873398F2
SHA256:9A153B6CEFE52B221C6FF8E950E43A4EC61C259F9F8866E23E7AC981AB58293D
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Postagebinary
MD5:D33C274B1EACBFA60FF92C14FC61DF66
SHA256:0CF09E4CDD05A19A5FE82C051D78CA901F4D0C0D3CCD6222966DDB4CC7C2841C
2096cmd.exeC:\Users\admin\AppData\Local\Temp\416815\bbinary
MD5:59B0023E471FC4B773CC02F5877C6C53
SHA256:32844C1E9B0D7C851182BEA761BAF41CB60BDEABF4721AC35D546DEC75F49662
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Alarmbinary
MD5:CDC72CDE22ECC75460FC46EC531B7E3A
SHA256:3120ED3699B4106CF6AAC5B8FC97C39C95E08C5DEDE1458BAD7E93E84B20F5E8
57647b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exeC:\Users\admin\AppData\Local\Temp\Tackle.jpgbinary
MD5:2E493940EB676AFC3E78DE1D6F8C6635
SHA256:2408CA787D06E6C8D54B2F075ED7DFFAA1318110E9866E608362069A9BEA40D3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
45
TCP/UDP connections
58
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
400
20.190.159.73:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
40.126.31.71:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
40.126.31.3:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
200
20.190.159.73:443
https://login.live.com/RST2.srf
unknown
xml
1.24 Kb
whitelisted
1936
RUXIMICS.exe
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
400
40.126.31.2:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
whitelisted
POST
400
40.126.31.73:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1936
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1936
RUXIMICS.exe
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4224
svchost.exe
40.126.32.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 184.24.77.35
  • 184.24.77.42
  • 184.24.77.6
  • 184.24.77.37
  • 184.24.77.12
  • 23.55.110.193
  • 23.55.110.211
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.132
  • 20.190.160.3
  • 20.190.160.22
  • 20.190.160.65
  • 40.126.32.140
  • 20.190.160.2
whitelisted
xFEeQVlXPmllyfPVmCkIvF.xFEeQVlXPmllyfPVmCkIvF
unknown
slscr.update.microsoft.com
  • 20.165.94.63
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
hexa.dnsframe.com
  • 45.148.4.11
unknown
self.events.data.microsoft.com
  • 20.42.65.93
whitelisted

Threats

No threats detected
No debug info