File name:

malc.jpg.ps1

Full analysis: https://app.any.run/tasks/18d1a792-a536-4d46-b1a8-fdc12ead2c63
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: May 07, 2024, 13:51:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
xworm
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (61648)
MD5:

BE764C9244F75FE9988B9A3445FADD67

SHA1:

E49DB253C97C98E2A489A56B1B7C45ECB7DEB175

SHA256:

D5536CADEC96E1956764742C0C2169446F0D5133FB4225EFCC9337CD5B37D058

SSDEEP:

1536:Xz4UwtBvPHH60LlT/eZdxdMIk/JqOGyQJxF+x7Irm2QkogQ8zLnRqRb5uDSPVZrL:NA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 580)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 1792)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 580)
    • XWORM has been detected (YARA)

      • aspnet_compiler.exe (PID: 2252)
  • SUSPICIOUS

    • Reads the Internet Settings

      • powershell.exe (PID: 3964)
      • wscript.exe (PID: 1988)
    • Uses TASKKILL.EXE to kill process

      • powershell.exe (PID: 3964)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 3964)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 3964)
    • Likely accesses (executes) a file from the Public directory

      • cmd.exe (PID: 1792)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 1792)
    • The process executes VB scripts

      • powershell.exe (PID: 3964)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 1988)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 1988)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 1792)
    • The process executes Powershell scripts

      • cmd.exe (PID: 1792)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 1988)
    • Writes data to a memory stream (POWERSHELL)

      • powershell.exe (PID: 3964)
      • powershell.exe (PID: 580)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 1792)
    • Connects to unusual port

      • aspnet_compiler.exe (PID: 2252)
  • INFO

    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 3964)
      • powershell.exe (PID: 580)
      • powershell.exe (PID: 580)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 3964)
      • powershell.exe (PID: 580)
    • Gets or sets the time when the file was last written to (POWERSHELL)

      • powershell.exe (PID: 3964)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 3964)
    • Creates a byte array (POWERSHELL)

      • powershell.exe (PID: 3964)
    • Creates files in the program directory

      • powershell.exe (PID: 3964)
    • Checks supported languages

      • aspnet_compiler.exe (PID: 2252)
    • Reads the machine GUID from the registry

      • aspnet_compiler.exe (PID: 2252)
    • Reads the computer name

      • aspnet_compiler.exe (PID: 2252)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(2252) aspnet_compiler.exe
C2xworm.duckdns.org:2040
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep timeBAT-BAT
USB drop nameUSB.exe
Mutex0io3rLbegA79VW42
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
15
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs wscript.exe no specs cmd.exe no specs powershell.exe no specs #XWORM aspnet_compiler.exe

Process information

PID
CMD
Path
Indicators
Parent process
112"C:\Windows\system32\taskkill.exe" /IM aspnet_compiler.exe /FC:\Windows\System32\taskkill.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
308"C:\Windows\system32\taskkill.exe" /IM MSBuild.exe /FC:\Windows\System32\taskkill.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
580PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& 'C:\BYFWGUBYFWGsBYFWGeBYFWGrBYFWGs\PBYFWGuBYFWGbBYFWGlBYFWGiBYFWGc\XCQHLHRULY.ps1'.replace('BYFWG','')"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
764"C:\Windows\system32\taskkill.exe" /IM RegAsm.exe /FC:\Windows\System32\taskkill.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
864"C:\Windows\system32\taskkill.exe" /IM aspnet_regbrowsers.exe /FC:\Windows\System32\taskkill.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1440"C:\Windows\system32\taskkill.exe" /IM InstallUtil.exe /FC:\Windows\System32\taskkill.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1604"C:\Windows\system32\taskkill.exe" /IM RegSvcs.exe /FC:\Windows\System32\taskkill.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1792C:\Windows\system32\cmd.exe /c ""C:\Users\Public\YXCJPBFNIWRA.bat" "C:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1864"C:\Windows\system32\taskkill.exe" /IM cvtres.exe /FC:\Windows\System32\taskkill.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1872"C:\Windows\system32\taskkill.exe" /IM AppLaunch.exe /FC:\Windows\System32\taskkill.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
Total events
7 919
Read events
7 847
Write events
72
Delete events
0

Modification events

(PID) Process:(3964) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3964) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3964) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3964) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3964) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3964) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Operation:writeName:Startup
Value:
C:\ProgramData\WindowsHost
(PID) Process:(3964) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Operation:writeName:Startup
Value:
C:\ProgramData\WindowsHost
(PID) Process:(1988) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1988) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1988) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
0
Suspicious files
9
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3964powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF103692.TMPbinary
MD5:0268C3470C936E6FBAC2945B9E1C2099
SHA256:DF2AF58E8879B48826D8A418ED3B02CC8D484BCFC231C5B7A11BD153ED3998E9
3964powershell.exeC:\Users\Public\YXCJPBFNIWRA.battext
MD5:FCDF39BF717F36200160B027CF2CAE3D
SHA256:5338DAEE3BC9F077C67759749323C336869FEEC7C16207C5F7AEBE9C57BF4DE9
3964powershell.exeC:\Users\admin\AppData\Local\Temp\z2dkqvzk.2mn.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3964powershell.exeC:\Users\admin\AppData\Local\Temp\enlon4ux.kvw.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3964powershell.exeC:\ProgramData\WindowsHost\IHPSDRYZSYL.vbstext
MD5:311828AC7A058853C099C28371D8690D
SHA256:064B747AEB4EB47B7B1059745A24AE0C2D9A438DA6C40FC7DC511ECFF5242C2D
3964powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:7B9FC8EDA8DFC3E128623081DB20030C
SHA256:81FB596D7C5C7C9264E891A660D7B00455DD9AC326B9B53816B1F2FE38F4FAED
3964powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E3FRGITKM40PKQGJ0UTP.tempbinary
MD5:7B9FC8EDA8DFC3E128623081DB20030C
SHA256:81FB596D7C5C7C9264E891A660D7B00455DD9AC326B9B53816B1F2FE38F4FAED
580powershell.exeC:\Users\admin\AppData\Local\Temp\2w3s4pb1.alp.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
580powershell.exeC:\Users\admin\AppData\Local\Temp\1bhkgkvr.a1l.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
3964powershell.exeC:\Users\Public\XCQHLHRULY.ps1text
MD5:E04363E824D53D00815861BC9484EE9A
SHA256:8482E098B619C9CF28A73E4CE81875977052B792693E9791B970BD0FFA071FC0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
4
Threats
8

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
2252
aspnet_compiler.exe
128.90.141.93:2040
xworm.duckdns.org
PHMGMT-AS1
FR
unknown

DNS requests

Domain
IP
Reputation
xworm.duckdns.org
  • 128.90.141.93
unknown

Threats

PID
Process
Class
Message
1088
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1088
svchost.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
No debug info