File name:

output.ps1

Full analysis: https://app.any.run/tasks/8f39aac2-07cd-4fd9-9d5a-af3ca0fbbd17
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: February 21, 2024, 13:15:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
xworm
remote
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (41009), with CRLF line terminators
MD5:

4B7E38F1CE53AF19B83D3886E57A7622

SHA1:

501093A9F45CD9CE75F5C65BEC0C5129E5F5DCDE

SHA256:

8B51C049CCFF081F5C28687F9943D8D2BC359DEC5C0A1D2FF82C0B76FBAF4761

SSDEEP:

1536:o6vnNBMPcaT9hWGLEGFWsN5tf1yQRhjTU:omBQTTJwGFlNjEsQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • May hide the program window using WMI (SCRIPT)

      • wscript.exe (PID: 3308)
      • wscript.exe (PID: 1792)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 2744)
      • powershell.exe (PID: 1596)
    • Connects to the CnC server

      • powershell.exe (PID: 2744)
    • XWORM has been detected (SURICATA)

      • powershell.exe (PID: 2744)
  • SUSPICIOUS

    • The Powershell connects to the Internet

      • powershell.exe (PID: 2160)
      • powershell.exe (PID: 2744)
    • Reads the Internet Settings

      • powershell.exe (PID: 2160)
      • powershell.exe (PID: 2744)
    • Unusual connection from system programs

      • powershell.exe (PID: 2160)
      • powershell.exe (PID: 2744)
    • Accesses WMI object, sets custom ImpersonationLevel (SCRIPT)

      • wscript.exe (PID: 3308)
      • wscript.exe (PID: 1792)
    • The process executes via Task Scheduler

      • wscript.exe (PID: 3308)
      • wscript.exe (PID: 1792)
    • Creates an object to access WMI (SCRIPT)

      • wscript.exe (PID: 3308)
      • wscript.exe (PID: 1792)
    • Executed via WMI

      • powershell.exe (PID: 2744)
      • powershell.exe (PID: 1596)
    • Connects to unusual port

      • powershell.exe (PID: 2744)
  • INFO

    • Creates files in the program directory

      • powershell.exe (PID: 2160)
    • Manual execution by a user

      • mmc.exe (PID: 2892)
      • mmc.exe (PID: 796)
      • wmpnscfg.exe (PID: 664)
    • Reads the computer name

      • wmpnscfg.exe (PID: 664)
    • Checks supported languages

      • wmpnscfg.exe (PID: 664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
11
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe notepad.exe no specs schtasks.exe no specs PhotoViewer.dll no specs mmc.exe no specs mmc.exe wscript.exe no specs #XWORM powershell.exe wscript.exe no specs powershell.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
664"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
796"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /sC:\Windows\System32\mmc.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Management Console
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mmc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mfc42u.dll
1596powershell.exe -NoProfile -executionPolicy Bypass -Command C:/ProgramData/Local/Microsoft/PackagedEventProviders/LfSvc/IdentityCRL/365360DD-2683-46DB-B389-6FF680AC4EA4.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
1792C:\Windows\System32\WScript.exe "C:\ProgramData\Local\Microsoft\PackagedEventProviders\LfSvc\365360DD-2683-46DB-B389-6FF680AC4EA4.vbs"C:\Windows\System32\wscript.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2160"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\AppData\Local\Temp\output.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2328C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2744powershell.exe -NoProfile -executionPolicy Bypass -Command C:/ProgramData/Local/Microsoft/PackagedEventProviders/LfSvc/IdentityCRL/365360DD-2683-46DB-B389-6FF680AC4EA4.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2892"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /sC:\Windows\System32\mmc.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Management Console
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mmc.exe
c:\windows\system32\ntdll.dll
3308C:\Windows\System32\WScript.exe "C:\ProgramData\Local\Microsoft\PackagedEventProviders\LfSvc\365360DD-2683-46DB-B389-6FF680AC4EA4.vbs"C:\Windows\System32\wscript.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3464"C:\Windows\system32\schtasks.exe" /create /tn TaskMachineUA{365360DD-2683-46DB-B389-6FF680AC4EA4} /tr C:\ProgramData\Local\Microsoft\PackagedEventProviders\LfSvc\365360DD-2683-46DB-B389-6FF680AC4EA4.vbs /sc minute /mo 3C:\Windows\System32\schtasks.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
Total events
14 657
Read events
14 572
Write events
84
Delete events
1

Modification events

(PID) Process:(2160) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2160) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2160) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2160) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2160) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2328) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
DllHost.exe
(PID) Process:(2328) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Photo Viewer\Viewer
Operation:writeName:MainWndPos
Value:
6000000034000000A00400008002000000000000
(PID) Process:(796) mmc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MMC\SnapIns\FX:{c7b8fb06-bfe1-4c2e-9217-7a69a95bbac4}
Operation:writeName:HelpTopic
Value:
C:\Windows\Help\taskscheduler.chm
(PID) Process:(796) mmc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MMC\SnapIns\FX:{c7b8fb06-bfe1-4c2e-9217-7a69a95bbac4}
Operation:writeName:LinkedHelpTopics
Value:
C:\Windows\Help\taskscheduler.chm
(PID) Process:(796) mmc.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Microsoft Management Console\Recent File List
Operation:delete keyName:(default)
Value:
Executable files
0
Suspicious files
5
Text files
4
Unknown types
6

Dropped files

PID
Process
Filename
Type
2160powershell.exeC:\Users\admin\AppData\Local\Temp\edrj0cal.ceb.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
2160powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:42E3956892291F5EE35E1B989213EF05
SHA256:D4E6947871B5FD00AD32F8707479DD6EC92AB65D8C6D157B1C0C3D99D575E468
2160powershell.exeC:\Users\admin\AppData\Local\Temp\nunexqmh.1fv.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
2744powershell.exeC:\Users\admin\AppData\Local\Temp\kk34qy13.syp.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
2744powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCachebinary
MD5:6675EDE59684F4A119D2E5DA282AFBE6
SHA256:5026C5EE8FA9ACB21718BF1FAD563C0A3FD5BC79327611FDF9C4ABD2647CE829
1596powershell.exeC:\Users\admin\AppData\Local\Temp\tcx1tnxk.vy0.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
796mmc.exeC:\Users\admin\AppData\Roaming\Microsoft\MMC\taskschdxml
MD5:4C598344AAF992B7FD68A864A9622727
SHA256:B3FADB7AFDD6AAE7A9600F133D7E8987006A7FA9D07CFA9D5B35DF5852F3F9FC
1596powershell.exeC:\Users\admin\AppData\Local\Temp\ngcp23ou.mzl.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
2160powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF17f695.TMPbinary
MD5:0268C3470C936E6FBAC2945B9E1C2099
SHA256:DF2AF58E8879B48826D8A418ED3B02CC8D484BCFC231C5B7A11BD153ED3998E9
2744powershell.exeC:\Users\admin\AppData\Local\Temp\0hzku4z1.skg.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
7
DNS requests
3
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2160
powershell.exe
GET
200
54.87.207.250:80
http://54.87.207.250/FKAWMCIQISOOSNOEMTS/Password.txt
unknown
text
16 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2160
powershell.exe
54.87.207.250:80
AMAZON-AES
US
unknown
2744
powershell.exe
188.114.96.3:443
paste.ee
CLOUDFLARENET
NL
unknown
2744
powershell.exe
91.92.245.113:7000
showtime24.store
Natskovi & Sie Ltd.
BG
unknown

DNS requests

Domain
IP
Reputation
paste.ee
  • 188.114.96.3
  • 188.114.97.3
shared
showtime24.store
  • 91.92.245.113
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
2160
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
2744
powershell.exe
Potential Corporate Privacy Violation
ET POLICY Pastebin-style Service (paste .ee) in TLS SNI
2744
powershell.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 7
2744
powershell.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
8 ETPRO signatures available at the full report
Process
Message
mmc.exe
Constructor: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
mmc.exe
OnInitialize: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
mmc.exe
AddIcons: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
mmc.exe
ProcessCommandLineArguments: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn