File name:

fm.exe

Full analysis: https://app.any.run/tasks/f5583c23-3a91-4ede-ab49-abc4d211d7c3
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: January 17, 2025, 12:06:09
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
remote
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

49FB90D138C7E5B1FC67B7DF690194C9

SHA1:

601BB874F9042C22940BB4DD8D3D14F09B969EC7

SHA256:

D94A4F318B6E0AF52227452344191280F6D5443BC72902DB3C123D675F49F407

SSDEEP:

98304:a+E5WAj0dUkbRRIpz8uXa/CAbal+AXfqz5q/2SvLvwy5J+0rZy+28a4hTjtKCziz:tc2Q4Agwk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • ฝั่ง.exe (PID: 1480)
    • XWORM has been detected (YARA)

      • ฝั่ง.exe (PID: 1480)
    • XWORM has been detected (SURICATA)

      • ฝั่ง.exe (PID: 1480)
  • SUSPICIOUS

    • Executing commands from a ".bat" file

      • fm.exe (PID: 4864)
    • Starts CMD.EXE for commands execution

      • fm.exe (PID: 4864)
      • cmd.exe (PID: 6352)
      • Loader-new.exe (PID: 1064)
    • Executable content was dropped or overwritten

      • fm.exe (PID: 4864)
      • ฝั่ง.exe (PID: 1480)
    • Reads security settings of Internet Explorer

      • fm.exe (PID: 4864)
    • Start notepad (likely ransomware note)

      • fm.exe (PID: 4864)
    • Query Microsoft Defender preferences

      • Loader-new.exe (PID: 1064)
    • Script disables Windows Defender's real-time protection

      • Loader-new.exe (PID: 1064)
    • Starts POWERSHELL.EXE for commands execution

      • Loader-new.exe (PID: 1064)
    • Reads the BIOS version

      • Loader-new.exe (PID: 1064)
    • Checks for external IP

      • ฝั่ง.exe (PID: 1480)
      • Loader-new.exe (PID: 1064)
      • svchost.exe (PID: 2192)
    • Hides command output

      • cmd.exe (PID: 6352)
      • cmd.exe (PID: 6368)
    • Application launched itself

      • cmd.exe (PID: 6352)
    • The process creates files with name similar to system file names

      • ฝั่ง.exe (PID: 1480)
    • Potential Corporate Privacy Violation

      • Loader-new.exe (PID: 1064)
    • Contacting a server suspected of hosting an CnC

      • ฝั่ง.exe (PID: 1480)
    • Connects to unusual port

      • ฝั่ง.exe (PID: 1480)
  • INFO

    • Reads the machine GUID from the registry

      • fm.exe (PID: 4864)
      • ฝั่ง.exe (PID: 1480)
    • Reads the computer name

      • fm.exe (PID: 4864)
      • ฝั่ง.exe (PID: 1480)
      • Loader-new.exe (PID: 1064)
    • Checks supported languages

      • fm.exe (PID: 4864)
      • ฝั่ง.exe (PID: 1480)
      • Loader-new.exe (PID: 1064)
    • The process uses the downloaded file

      • fm.exe (PID: 4864)
    • Process checks computer location settings

      • fm.exe (PID: 4864)
    • Reads Microsoft Office registry keys

      • fm.exe (PID: 4864)
    • Creates files or folders in the user directory

      • fm.exe (PID: 4864)
      • ฝั่ง.exe (PID: 1480)
    • Reads Environment values

      • ฝั่ง.exe (PID: 1480)
    • Disables trace logs

      • ฝั่ง.exe (PID: 1480)
    • Checks proxy server information

      • ฝั่ง.exe (PID: 1480)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 3840)
      • notepad.exe (PID: 4980)
      • notepad.exe (PID: 5728)
    • Process checks whether UAC notifications are on

      • Loader-new.exe (PID: 1064)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 5848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(1480) ฝั่ง.exe
C2185.84.161.65:7000
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexLObZSUHGF6YPhPo7
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:16 07:50:56+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 4142080
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x3f539e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: ปลดแบน fm.exe
LegalCopyright:
OriginalFileName: ปลดแบน fm.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
15
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start fm.exe cmd.exe no specs conhost.exe no specs loader-new.exe no specs loader-new.exe conhost.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs #XWORM ฝั่ง.exe powershell.exe no specs svchost.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1064"C:\Users\admin\AppData\Roaming\Loader-new.exe" C:\Users\admin\AppData\Roaming\Loader-new.exe
fm.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\roaming\loader-new.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1480"C:\Users\admin\AppData\Roaming\ฝั่ง.exe" C:\Users\admin\AppData\Roaming\ฝั่ง.exe
fm.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\ฝั่ง.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(1480) ฝั่ง.exe
C2185.84.161.65:7000
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
MutexLObZSUHGF6YPhPo7
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3820\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3840"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Roaming\วิธีใช้งาน Mw3 Call of duty.txtC:\Windows\System32\notepad.exefm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeLoader-new.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4516"C:\Users\admin\AppData\Roaming\Loader-new.exe" C:\Users\admin\AppData\Roaming\Loader-new.exefm.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\roaming\loader-new.exe
c:\windows\system32\ntdll.dll
4544C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Roaming\Clear Unban WichxGod.bat" "C:\Windows\System32\cmd.exefm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
4864"C:\Users\admin\Desktop\fm.exe" C:\Users\admin\Desktop\fm.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\fm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4980"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Roaming\วิธีใช้งาน External.txtC:\Windows\System32\notepad.exefm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
10 432
Read events
10 414
Write events
18
Delete events
0

Modification events

(PID) Process:(4864) fm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
Operation:writeName:txtfile
Value:
(PID) Process:(1480) ฝั่ง.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\????_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1480) ฝั่ง.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\????_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1480) ฝั่ง.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\????_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1480) ฝั่ง.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\????_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(1480) ฝั่ง.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\????_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(1480) ฝั่ง.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\????_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1480) ฝั่ง.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\????_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1480) ฝั่ง.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\????_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1480) ฝั่ง.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\????_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
3
Suspicious files
1
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
4864fm.exeC:\Users\admin\AppData\Roaming\ฝั่ง.exeexecutable
MD5:360E90595E648226C810A05C5FD41F4E
SHA256:AF2BDE616143CD787BD018EE4A8DA56B5BE1515D77303D80B51E0943FC866D24
4864fm.exeC:\Users\admin\AppData\Roaming\วิธีปลดแบน.txttext
MD5:12C7805B30664493F9E01EDBAD2F126C
SHA256:A763B57D21B26341EC5773BF1671A6EEE65E46B1991F5E79DABEF498E8B733E3
4864fm.exeC:\Users\admin\AppData\Roaming\Clear Unban WichxGod.battext
MD5:0500BA99EEDADB2952C2D8902B4C3AA4
SHA256:06DED649A856B338D0207BE6314340E0633A4FE768544EC52010C7070A65C6CA
5848powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_43mdhqo4.bmd.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5848powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:28A481D30EDCAA03CB29D32186383ACD
SHA256:F9A24CBC3CC023CA99797E2BCDCE3F019E47AD00746828435ABF5F0A6688FB5E
4864fm.exeC:\Users\admin\AppData\Roaming\Loader-new.exeexecutable
MD5:29A7B827DA8FC2FAA7B6ABD9E8F6E254
SHA256:5295E8D32C15B598EA8DFA1E81DF38813E193469F667CECFA2A1385AE0036748
4864fm.exeC:\Users\admin\AppData\Roaming\วิธีใช้งาน External.txttext
MD5:83214FAA10372BA44F3291F43727F2FC
SHA256:7196A55807BEE99A42CABA25DA85B54C5ACADAC09A026060660995893549C63D
1480ฝั่ง.exeC:\Users\admin\AppData\Roaming\svchost.exeexecutable
MD5:360E90595E648226C810A05C5FD41F4E
SHA256:AF2BDE616143CD787BD018EE4A8DA56B5BE1515D77303D80B51E0943FC866D24
5848powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fwgndaya.cdk.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4864fm.exeC:\Users\admin\AppData\Roaming\วิธีใช้งาน Mw3 Call of duty.txttext
MD5:3FBFCE22A1F1C3507CBC4F93015CA949
SHA256:7F7DF8B48965F29425ED6FCAD76D307B0857000D1F0B2E1457FB1177D09ED851
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
44
DNS requests
8
Threats
28

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3220
svchost.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3220
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1480
ฝั่ง.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.227.221:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3220
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3220
svchost.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
3220
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 2.23.227.221
  • 2.23.227.208
  • 2.23.227.215
whitelisted
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.51
  • 2.16.164.106
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
ip-api.com
  • 208.95.112.1
shared
api.ipify.org
  • 172.67.74.152
  • 104.26.13.205
  • 104.26.12.205
shared
self.events.data.microsoft.com
  • 52.168.112.66
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2192
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
1480
ฝั่ง.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
1480
ฝั่ง.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2192
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
1064
Loader-new.exe
Potential Corporate Privacy Violation
ET INFO Possible IP Check api.ipify.org
1064
Loader-new.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
1480
ฝั่ง.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
1480
ฝั่ง.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
1480
ฝั่ง.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
No debug info