File name:

8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31

Full analysis: https://app.any.run/tasks/5fc54c37-3970-4a58-b76c-84d7745c3e63
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: January 10, 2025, 17:52:34
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
xworm
crypto-regex
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

32896203DCC72E3B55BF8C2C2C952213

SHA1:

CACF4038F5A7D58F57DD9395FB5AD984CC3C89CE

SHA256:

8B13FFADE0A723709CCD26426A3910FC7BA8BEF92D09B83B403623AD1C4F9A31

SSDEEP:

49152:knJQxLu7gpSyy2ehfBQdS2rEVyt+KW9lUBP13OcN4POnCWe9OzDZlkuBjF0Gb7HI:hxi7gXy7ZQdSAEITWuBPdOccYCWmOzDI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6348)
      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
    • XWORM has been detected (YARA)

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6348)
    • Found regular expressions for crypto-addresses (YARA)

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 2192)
    • Connects to unusual port

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
  • INFO

    • Creates files or folders in the user directory

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6348)
      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
    • Reads the machine GUID from the registry

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6348)
    • Reads the computer name

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6348)
    • Manual execution by a user

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
    • Checks supported languages

      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6348)
      • 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe (PID: 6880)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(6880) 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe
C2moneymaker-30608.portmap.host:30608
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.4
MutexQK1CzL0nvykMEU6n
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

AssemblyVersion: 1.0.0.0
ProductVersion: 1.0.0.0
ProductName: Wjzil
OriginalFileName: Wjzil.exe
LegalTrademarks: -
LegalCopyright: Copyright © 2020
InternalName: Wjzil.exe
FileVersion: 1.0.0.0
FileDescription: Wjzil
CompanyName: -
Comments: -
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x110362
UninitializedDataSize: -
InitializedDataSize: 2048
CodeSize: 1106944
LinkerVersion: 8
PEType: PE32
ImageFileCharacteristics: Executable, 32-bit
TimeStamp: 2024:12:03 11:02:56+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
3
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe #XWORM 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
6348"C:\Users\admin\AppData\Local\Temp\8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe" C:\Users\admin\AppData\Local\Temp\8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Wjzil
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6880"C:\Users\admin\AppData\Local\Temp\8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe"C:\Users\admin\AppData\Local\Temp\8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Wjzil
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
XWorm
(PID) Process(6880) 8b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exe
C2moneymaker-30608.portmap.host:30608
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.4
MutexQK1CzL0nvykMEU6n
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
Total events
680
Read events
680
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
68808b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkbinary
MD5:5222827DCE71847391A715321FE55484
SHA256:EE89C2E38DB9B7DD8810731C6E96113B052D8CE02CA22C9EE618A6B578789FD3
63488b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ObjRef.vbstext
MD5:F581951AEC0C332F0D360C3C7BAEC554
SHA256:77D9432EED5DB68A6A69C3A3E844DC840C498181DCE2457E02670E2CB1BDB74F
63488b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exeC:\Users\admin\AppData\Roaming\ObjRef.exeexecutable
MD5:32896203DCC72E3B55BF8C2C2C952213
SHA256:8B13FFADE0A723709CCD26426A3910FC7BA8BEF92D09B83B403623AD1C4F9A31
68808b13ffade0a723709ccd26426a3910fc7ba8bef92d09b83b403623ad1c4f9a31.exeC:\Users\admin\AppData\Roaming\XClient.exeexecutable
MD5:32896203DCC72E3B55BF8C2C2C952213
SHA256:8B13FFADE0A723709CCD26426A3910FC7BA8BEF92D09B83B403623AD1C4F9A31
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
86
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4308
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4308
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5464
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4308
svchost.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4308
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.171:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.186.142
whitelisted
www.bing.com
  • 104.126.37.171
  • 104.126.37.130
  • 104.126.37.153
  • 104.126.37.144
  • 104.126.37.186
  • 104.126.37.123
  • 104.126.37.155
  • 104.126.37.139
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.67
  • 20.190.159.4
  • 20.190.159.2
  • 20.190.159.75
  • 20.190.159.68
  • 20.190.159.0
  • 40.126.31.71
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
moneymaker-30608.portmap.host
  • 193.161.193.99
malicious
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host)
Potential Corporate Privacy Violation
ET POLICY DNS Query to a Reverse Proxy Service Observed
No debug info