File name:

README.md

Full analysis: https://app.any.run/tasks/cc8d752a-be01-4f84-b54e-4fa0cc7f237e
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: May 11, 2025, 14:20:36
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
crypto-regex
xworm
ip-check
Indicators:
MIME: text/plain
File info: ASCII text
MD5:

431C67E4A8A9B04FE4A93FEE34514EEF

SHA1:

41150564C8EC2E5615094FAE576AFAC220B7E96E

SHA256:

C614A0042665BBD850E20735FEE011E0A602D2F4C028A4D728C6D40EC26A171A

SSDEEP:

3:7WNlRlGfALtGTWEwCFkO9JOGRZRSLNKfYwhBwNALXn:SWMG6pgOG4LNKAw8yn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XWORM has been detected (YARA)

      • XWorm.exe (PID: 5260)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 1184)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 1184)
    • The process checks if it is being run in the virtual environment

      • XWorm.exe (PID: 5260)
    • There is functionality for capture public ip (YARA)

      • XWorm.exe (PID: 5260)
    • There is functionality for taking screenshot (YARA)

      • XWorm.exe (PID: 5260)
    • Found regular expressions for crypto-addresses (YARA)

      • XWorm.exe (PID: 5260)
  • INFO

    • Manual execution by a user

      • WinRAR.exe (PID: 1184)
      • XWorm.exe (PID: 5260)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 5744)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1184)
    • Reads the software policy settings

      • slui.exe (PID: 4300)
      • slui.exe (PID: 2980)
    • Reads the computer name

      • XWorm.exe (PID: 5260)
    • Reads the machine GUID from the registry

      • XWorm.exe (PID: 5260)
    • Checks supported languages

      • XWorm.exe (PID: 5260)
    • Checks proxy server information

      • slui.exe (PID: 2980)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start openwith.exe no specs sppextcomobj.exe no specs slui.exe winrar.exe rundll32.exe no specs slui.exe #XWORM xworm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1184"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\XWorm v1.0.7z" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2980C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4300"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4844C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5260"C:\Users\admin\Desktop\XWorm v1.0\XWorm.exe" C:\Users\admin\Desktop\XWorm v1.0\XWorm.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
XWorm
Exit code:
0
Version:
2.2.0.0
Modules
Images
c:\users\admin\desktop\xworm v1.0\xworm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5744"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\AppData\Local\Temp\README.mdC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6108C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
Total events
4 021
Read events
4 011
Write events
10
Delete events
0

Modification events

(PID) Process:(1184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(1184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5260) XWorm.exeKey:HKEY_CURRENT_USER\SOFTWARE\XWorm
Operation:writeName:License
Value:
(PID) Process:(5260) XWorm.exeKey:HKEY_CURRENT_USER\SOFTWARE\XWorm
Operation:writeName:Port
Value:
7000
(PID) Process:(5260) XWorm.exeKey:HKEY_CURRENT_USER\SOFTWARE\XWorm
Operation:writeName:Key
Value:
<123456789>
(PID) Process:(5260) XWorm.exeKey:HKEY_CURRENT_USER\SOFTWARE\XWorm
Operation:writeName:Php
Value:
http://exmple.com/Uploader.php
(PID) Process:(5260) XWorm.exeKey:HKEY_CURRENT_USER\SOFTWARE\XWorm
Operation:writeName:NoteF
Value:
True
Executable files
60
Suspicious files
2
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\Fixer.battext
MD5:2DABC46CE85AAFF29F22CD74EC074F86
SHA256:A11703FD47D16020FA099A95BB4E46247D32CF8821DC1826E77A971CDD3C4C55
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\FastColoredTextBox.dllexecutable
MD5:B746707265772B362C0BA18D8D630061
SHA256:3701B19CCDAC79B880B197756A972027E2AC609EBED36753BD989367EA4EF519
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\Intro.wavbinary
MD5:232B04FB1ABE851A5CBCF6DAC970674F
SHA256:4C0E42C48B2D0944023EC9B45DFB88029D92BCE5A4F30AA8064E6400BD9488D2
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\dnlib.dllexecutable
MD5:9ED69FBBFDEC5D95EA229DA3969DD77B
SHA256:E8BC7A627149386CB3CF714AE0101F69440F72CF2E7468A677B727B32AAED755
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\Plugins\AskUAC.dllexecutable
MD5:460F11F444B4C74DB325D06AECA71A29
SHA256:8862EF216FCF1AC876420CA1C10AA40D6D87A2F13C92E47B79A5F2323E39DB4C
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\GMap.NET.Core.dllexecutable
MD5:819352EA9E832D24FC4CEBB2757A462B
SHA256:58C755FCFC65CDDEA561023D736E8991F0AD69DA5E1378DEA59E98C5DB901B86
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\Plugins\BSOD.dllexecutable
MD5:EB056AA9D5B8A244EA3E1ABCF5D57C05
SHA256:8EDEE317AA202F38ED8247BDEC7605651E52A80BCBAF7290C2AB05A9302F241F
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\IconExtractor.dllexecutable
MD5:640D8FFA779C6DD5252A262E440C66C0
SHA256:440912D85D2F98BB4F508AB82847067C18E1E15BE0D8ECDCFF0CC19327527FC2
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\Guna.UI2.dllexecutable
MD5:D65FD6DBBD3C9AC74139AEAEDC4A5816
SHA256:84199A22C8669A39800272C3DA0D969EC4E8D77D67B9D324CA049953A5042C71
1184WinRAR.exeC:\Users\admin\Desktop\XWorm v1.0\NAudio.dllexecutable
MD5:3B87D1363A45CE9368E9BAEC32C69466
SHA256:81B3F1DC3F1EAC9762B8A292751A44B64B87D0D4C3982DEBFDD2621012186451
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
24
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.173:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5936
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5936
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.173:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.1:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5936
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.173
  • 23.48.23.158
  • 23.48.23.169
  • 23.48.23.177
  • 23.48.23.156
  • 23.48.23.194
  • 23.48.23.176
  • 23.48.23.159
  • 23.48.23.145
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.1
  • 20.190.159.129
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.71
  • 20.190.159.131
  • 40.126.31.131
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info