File name:

SecuriteInfo.com.Win64.MalwareX-gen.25550.20765

Full analysis: https://app.any.run/tasks/72625d48-179f-4c7b-8936-02185110b1f4
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: May 17, 2025, 05:01:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
generic
crypto-regex
remote
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 20 sections
MD5:

A9A67BC3C3B3B1D85F2C6F126B7604A5

SHA1:

A9E922E78403466F9B3C1D3C176CDA22AE433190

SHA256:

81997543956E55BE841EB355689D94756B835A44ED083D57C8B61DF05D762974

SSDEEP:

98304:RBObFJfAFxipQm+dqogLNLyDkehnbSyfcLfU07rk4mOzO0cfXujZKhL6ncXq7b8U:LQ2eV3McQmCG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe (PID: 7232)
      • vlc.exe (PID: 7320)
    • XWORM has been detected (SURICATA)

      • explorer.exe (PID: 5492)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe (PID: 7232)
      • vlc.exe (PID: 7320)
    • Reads security settings of Internet Explorer

      • SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe (PID: 7232)
    • Reads the date of Windows installation

      • SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe (PID: 7232)
    • Connects to unusual port

      • explorer.exe (PID: 5492)
    • Found regular expressions for crypto-addresses (YARA)

      • vlc.exe (PID: 7320)
    • Contacting a server suspected of hosting an CnC

      • explorer.exe (PID: 5492)
  • INFO

    • Checks supported languages

      • vlc.exe (PID: 7320)
      • SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe (PID: 7232)
    • The sample compiled with english language support

      • SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe (PID: 7232)
      • vlc.exe (PID: 7320)
    • Creates files in the program directory

      • vlc.exe (PID: 7320)
      • SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe (PID: 7232)
    • Creates files or folders in the user directory

      • vlc.exe (PID: 7320)
    • Reads the computer name

      • SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe (PID: 7232)
    • Reads the software policy settings

      • slui.exe (PID: 7528)
    • Process checks computer location settings

      • SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe (PID: 7232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:30 22:39:34+00:00
ImageFileCharacteristics: Executable, No line numbers, Large address aware
PEType: PE32+
LinkerVersion: 2.41
CodeSize: 762880
InitializedDataSize: 10038272
UninitializedDataSize: 3584
EntryPoint: 0x10ed
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GENERIC securiteinfo.com.win64.malwarex-gen.25550.20765.exe #GENERIC vlc.exe sppextcomobj.exe no specs slui.exe #XWORM explorer.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5492C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
7232"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win64.malwarex-gen.25550.20765.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7320"C:\ProgramData\XyleShield\vlc.exe" C:\ProgramData\XyleShield\vlc.exe
SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exe
User:
admin
Company:
VideoLAN
Integrity Level:
HIGH
Description:
VLC media player
Version:
3.0.21
Modules
Images
c:\programdata\xyleshield\vlc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7496C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
7528"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msxml6.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\ondemandconnroutehelper.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\webio.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\winnsi.dll
Total events
1 250
Read events
1 250
Write events
0
Delete events
0

Modification events

No data
Executable files
16
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7232SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exeC:\ProgramData\XyleShield\libvlc.dllexecutable
MD5:264A9E0194DBD3C0540D67B156ECAABA
SHA256:095D164633AF53AC015DCD76540E8523744F57D506DB111F19B3FDD9D6180833
7232SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exeC:\ProgramData\XyleShield\libvlccore.dllexecutable
MD5:1F76B1DF2D1F1B0C02C864A3ACAF04AB
SHA256:4FE971455D80831056DB2363354EA252113BDCB42C64F5E9E9602FD067DA214F
7232SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exeC:\ProgramData\XyleShield\vlc.exeexecutable
MD5:F9538485432D3EC640F89096BA2D4D00
SHA256:5D695D8A0BB1D919CC77A2AA2488A61797BFA065238160278EE458120630AAF9
7232SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exeC:\ProgramData\XyleShield\libcrypto-3-x64.dllexecutable
MD5:13C723D5668B0FAF2039238FA04D9634
SHA256:0761F0D83514334E9278D9BADDF06239F8E780DA3A28E35880C050EABEC87CD2
7232SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exeC:\ProgramData\XyleShield\libwinpthread-1.dllexecutable
MD5:808A2BA82312143CDCF7A42CBFA3E13D
SHA256:D1E9581D6464427D0A15EBD5AE9199328AAB33CB119D122B57809659C065CDCA
7232SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exeC:\ProgramData\XyleShield\libstdc++-6.dllexecutable
MD5:5D9253EEAC70FCF559278B4BC8286E04
SHA256:975B3727A607C8B06157537FF80C08BC9640891DDEA6510D368CF807B3339345
7232SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exeC:\ProgramData\XyleShield\ConsoleApplication15.dllexecutable
MD5:26EFFB7076A4AE8A82383B934EED2023
SHA256:61EEDF98879F53C5ED67230C45B08F7D3595ECB175535ADBE864F4AD55DBF45F
7320vlc.exeC:\Users\admin\AppData\Roaming\vlcapp\libstdc++-6.dllexecutable
MD5:5D9253EEAC70FCF559278B4BC8286E04
SHA256:975B3727A607C8B06157537FF80C08BC9640891DDEA6510D368CF807B3339345
7320vlc.exeC:\Users\admin\AppData\Roaming\vlcapp\vlc.exeexecutable
MD5:F9538485432D3EC640F89096BA2D4D00
SHA256:5D695D8A0BB1D919CC77A2AA2488A61797BFA065238160278EE458120630AAF9
7232SecuriteInfo.com.Win64.MalwareX-gen.25550.20765.exeC:\ProgramData\XyleShield\libgcc_s_seh-1.dllexecutable
MD5:22FC85DB52A89E2E5B445BE4665D440E
SHA256:FC9636D3D17ED75BA4EC18299124F455C8B8CEC372C876AF932A724DB3417A56
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
15
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8184
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8184
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4784
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.129
  • 20.190.159.73
  • 40.126.31.73
  • 20.190.159.2
  • 40.126.31.69
  • 20.190.159.68
  • 40.126.31.71
  • 20.190.159.4
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
5492
explorer.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
No debug info