File name:

7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe

Full analysis: https://app.any.run/tasks/06b2d92a-6557-4604-8792-6c7537fbf22f
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: August 01, 2025, 01:11:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-sch
auto-startup
autoit
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

5EA006803BBA64C15FE68791A8DB5005

SHA1:

F10DD374C76E194C8B7E0381A80DB57281A1E77B

SHA256:

7B232254D4B4BE67111E92F5C2E34BC331403393C2D019B31E256CA7D798CD08

SSDEEP:

24576:zBpF296jwiDP76SZLI5a2/fbqFd0WXbkUzKkUx585GclTDGiyBS1ooBrdGYOZaVj:zBL296jwiDP76SZLI5a2/fbqFd0WXbkQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 1132)
    • Create files in the Startup directory

      • cmd.exe (PID: 440)
      • MSBuild.exe (PID: 2220)
    • XWORM has been detected (YARA)

      • MSBuild.exe (PID: 2220)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
    • Starts CMD.EXE for commands execution

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • cmd.exe (PID: 1232)
    • Application launched itself

      • cmd.exe (PID: 1232)
    • Get information on the list of running processes

      • cmd.exe (PID: 2096)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 2096)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 2096)
    • The executable file from the user directory is run by the CMD process

      • Nation.pif (PID: 2504)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 2096)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2096)
    • There is functionality for taking screenshot (YARA)

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • Nation.pif (PID: 2504)
    • Process drops legitimate windows executable

      • MSBuild.exe (PID: 2220)
    • Connects to unusual port

      • MSBuild.exe (PID: 2220)
  • INFO

    • Create files in a temporary directory

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • extrac32.exe (PID: 2400)
    • The sample compiled with english language support

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
    • Reads the computer name

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • extrac32.exe (PID: 2400)
      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
    • Checks supported languages

      • 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe (PID: 5764)
      • extrac32.exe (PID: 2400)
      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
    • Reads mouse settings

      • Nation.pif (PID: 2504)
    • Manual execution by a user

      • cmd.exe (PID: 1132)
      • wscript.exe (PID: 4080)
      • cmd.exe (PID: 440)
    • Creates files or folders in the user directory

      • Nation.pif (PID: 2504)
      • MSBuild.exe (PID: 2220)
    • Launching a file from Task Scheduler

      • cmd.exe (PID: 1132)
    • Launching a file from the Startup directory

      • cmd.exe (PID: 440)
      • MSBuild.exe (PID: 2220)
    • Reads the machine GUID from the registry

      • MSBuild.exe (PID: 2220)
    • Reads the software policy settings

      • slui.exe (PID: 1592)
    • Checks proxy server information

      • slui.exe (PID: 1592)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(2220) MSBuild.exe
C2hexa.dnsframe.com:66
Keys
AES<666>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameinj3ct0r HexaOpen
MutexFzSIsfqlHwWWhS56
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:02:25 04:48:34+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 29696
InitializedDataSize: 491520
UninitializedDataSize: 16896
EntryPoint: 0x3a10
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 31.0.4.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: OBS
FileDescription: OBS Studio
FileVersion: 31.0.4
InternalName: obs
OriginalFileName: obs
ProductName: OBS Studio
ProductVersion: 31.0.4
Comments: Free and open source software for video recording and live streaming
LegalCopyright: (C) Lain Bailey
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
18
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs tasklist.exe no specs findstr.exe no specs extrac32.exe no specs findstr.exe no specs nation.pif waitfor.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe conhost.exe no specs schtasks.exe no specs wscript.exe no specs #XWORM msbuild.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
440cmd /k echo [InternetShortcut] > "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SpectraFox.url" & echo URL="C:\Users\admin\AppData\Local\ColorSync Dynamics\SpectraFox.js" >> "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SpectraFox.url" & exitC:\Windows\SysWOW64\cmd.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
512\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1132cmd /c schtasks.exe /create /tn "Started" /tr "wscript //B 'C:\Users\admin\AppData\Local\ColorSync Dynamics\SpectraFox.js'" /sc minute /mo 5 /FC:\Windows\SysWOW64\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1232cmd.exe /c cmd < Conditions.jpgC:\Windows\SysWOW64\cmd.exe7b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1592C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1660schtasks.exe /create /tn "Started" /tr "wscript //B 'C:\Users\admin\AppData\Local\ColorSync Dynamics\SpectraFox.js'" /sc minute /mo 5 /FC:\Windows\SysWOW64\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2096cmd C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2220C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
Nation.pif
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
XWorm
(PID) Process(2220) MSBuild.exe
C2hexa.dnsframe.com:66
Keys
AES<666>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameinj3ct0r HexaOpen
MutexFzSIsfqlHwWWhS56
2400extrac32 /Y Tackle.jpg *.*C:\Windows\SysWOW64\extrac32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® CAB File Extract Utility
Exit code:
0
Version:
5.00 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\extrac32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2504Nation.pif b C:\Users\admin\AppData\Local\Temp\416815\Nation.pif
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Version:
3, 3, 17, 0
Modules
Images
c:\users\admin\appdata\local\temp\416815\nation.pif
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
Total events
4 679
Read events
4 679
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
14
Text files
4
Unknown types
3

Dropped files

PID
Process
Filename
Type
57647b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exeC:\Users\admin\AppData\Local\Temp\Circus.jpgbinary
MD5:18139D2F4C9997BC035762F855B6D5D1
SHA256:FD1F4FA3AE296EA469E615398DCF892E09A6B84012A2B70502F873DBDCC8DA23
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Alarmbinary
MD5:CDC72CDE22ECC75460FC46EC531B7E3A
SHA256:3120ED3699B4106CF6AAC5B8FC97C39C95E08C5DEDE1458BAD7E93E84B20F5E8
2096cmd.exeC:\Users\admin\AppData\Local\Temp\416815\Nation.piftext
MD5:AC6AD5D9B99757C3A878F2D275ACE198
SHA256:9B8DB510EF42B8ED54A3712636FDA55A4F8CFCD5493E20B74AB00CD4F3979F2D
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Publiclymp3
MD5:3AC9EB1889E273C47027F3692CA0B73F
SHA256:4177B4E03FDF9DC7FCBEAC232311E19552A3E96BED6AA7484ED418C0DB7D22C9
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Centbinary
MD5:F72DB6FA01B1AB777508378FF4129D67
SHA256:1B5ACCB8487ADDC0F92F039FDA87FD80B87ADECC3648985040A7ED67DBB677D4
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Sharkbinary
MD5:419D278BD43FE25DDB79CD1251B7363B
SHA256:68DE54543C1310CCFCEC132B8385C6C250F5C1516AEE0FB9AB3B01AF0AF73426
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Tiedbinary
MD5:FEFE1D66C38B1A3A2219A819873398F2
SHA256:9A153B6CEFE52B221C6FF8E950E43A4EC61C259F9F8866E23E7AC981AB58293D
57647b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exeC:\Users\admin\AppData\Local\Temp\Conditions.jpgtext
MD5:77C0B5F0568037478788BC63CB798899
SHA256:C5DF26FD3409CE100BFD79910D231D2064652E18F8987445AA539031175EC7F4
57647b232254d4b4be67111e92f5c2e34bc331403393c2d019b31e256ca7d798cd08.bin.exeC:\Users\admin\AppData\Local\Temp\Specifics.jpgbinary
MD5:5F40CB08393AB35BAD16C403D76204B6
SHA256:36B8B46A7562CC1AFC5A93D483C4EED990CF141D5108FDCCABC8507B05A17B95
2400extrac32.exeC:\Users\admin\AppData\Local\Temp\Temporarilyabr
MD5:4087B1EDBDD242F600047F688254CD44
SHA256:9453B49CDF51AC78C66E29A4EE48DF73A24C24F48215337ABAFD2081ABD0218B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
45
TCP/UDP connections
58
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1936
RUXIMICS.exe
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
400
20.190.159.73:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
200
20.190.159.73:443
https://login.live.com/RST2.srf
unknown
xml
1.24 Kb
whitelisted
POST
400
40.126.31.3:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
40.126.31.71:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
40.126.31.73:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
20.190.159.71:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1936
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1936
RUXIMICS.exe
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4224
svchost.exe
40.126.32.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 184.24.77.35
  • 184.24.77.42
  • 184.24.77.6
  • 184.24.77.37
  • 184.24.77.12
  • 23.55.110.193
  • 23.55.110.211
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.132
  • 20.190.160.3
  • 20.190.160.22
  • 20.190.160.65
  • 40.126.32.140
  • 20.190.160.2
whitelisted
xFEeQVlXPmllyfPVmCkIvF.xFEeQVlXPmllyfPVmCkIvF
unknown
slscr.update.microsoft.com
  • 20.165.94.63
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
hexa.dnsframe.com
  • 45.148.4.11
unknown
self.events.data.microsoft.com
  • 20.42.65.93
whitelisted

Threats

No threats detected
No debug info