File name:

RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.zip

Full analysis: https://app.any.run/tasks/c574f56a-0bc2-4972-8ce3-c26e71169801
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: January 10, 2025, 22:47:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
xworm
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

380388FCAFF38D5D89C93393C3A16213

SHA1:

52A975C9352A613B33CA1A3551A045DF2CEAE16D

SHA256:

DB6EB9175547A44FC6C466F35C75541EA8020852F027BBB55DDB876DD6C9F0FD

SSDEEP:

49152:y/nP2dWuVLblH08qYuFRdi4jDniddcDKzAdY9uBEQHY7ERGqcfKAvTjNwWxJjenm:y3iWuFleRzdi4vidWDyAdhBxY7kc37KY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts Visual C# compiler

      • RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe (PID: 6740)
      • RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe (PID: 3736)
    • XWORM has been detected (SURICATA)

      • csc.exe (PID: 4724)
    • Changes the autorun value in the registry

      • RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe (PID: 3736)
    • Connects to the CnC server

      • csc.exe (PID: 4724)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4308)
    • Connects to unusual port

      • csc.exe (PID: 4724)
    • Contacting a server suspected of hosting an CnC

      • csc.exe (PID: 4724)
  • INFO

    • Checks supported languages

      • csc.exe (PID: 4724)
      • RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe (PID: 6740)
      • RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe (PID: 3736)
      • csc.exe (PID: 4264)
    • Reads the computer name

      • csc.exe (PID: 4724)
      • csc.exe (PID: 4264)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 4308)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4308)
    • Manual execution by a user

      • RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe (PID: 3736)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 4724)
      • csc.exe (PID: 4264)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: RV URGENTE!!, NOTIFICACI?N AUTO ASUME CONOCIMIENTO ACCI?N DE TUTELA 2024-00198.exe
ZipUncompressedSize: 2229760
ZipCompressedSize: 955705
ZipCRC: 0x09ec8583
ZipModifyDate: 2025:01:10 08:16:16
ZipCompression: Deflated
ZipBitFlag: 0x0009
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
5
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe rv urgente!!, notificación auto asume conocimiento acción de tutela 2024-00198.exe no specs #XWORM csc.exe rv urgente!!, notificación auto asume conocimiento acción de tutela 2024-00198.exe csc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4308"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6740"C:\Users\admin\AppData\Local\Temp\Rar$EXb4308.8982\RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb4308.8982\RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3611307768
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb4308.8982\rv urgente!!, notificación auto asume conocimiento acción de tutela 2024-00198.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
4724"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
3736"C:\Users\admin\Desktop\RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe" C:\Users\admin\Desktop\RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3611307768
Modules
Images
c:\users\admin\desktop\rv urgente!!, notificación auto asume conocimiento acción de tutela 2024-00198.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4264"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeRV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
2 889
Read events
2 861
Write events
15
Delete events
13

Modification events

(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.zip
(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(4308) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6740RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exeC:\Users\admin\Documents\NordVPNnetworkTAP\Lang\RemotePCPrinter.exe
MD5:
SHA256:
4308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4308.8982\RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exeexecutable
MD5:A2A55857C207BCEDA9C7F57F0E2D6D00
SHA256:C8FCDD95C7781AD4D31631EF2D32FD375B0C19F2F5E0B672213D47A5486D51AF
4308WinRAR.exeC:\Users\admin\Desktop\RV URGENTE!!, NOTIFICACIÓN AUTO ASUME CONOCIMIENTO ACCIÓN DE TUTELA 2024-00198.exeexecutable
MD5:A2A55857C207BCEDA9C7F57F0E2D6D00
SHA256:C8FCDD95C7781AD4D31631EF2D32FD375B0C19F2F5E0B672213D47A5486D51AF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
33
DNS requests
18
Threats
21

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7060
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7060
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6228
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
640
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.123:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
google.com
  • 142.250.184.238
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.bing.com
  • 104.126.37.123
  • 104.126.37.171
  • 104.126.37.178
  • 104.126.37.131
  • 104.126.37.185
  • 104.126.37.176
  • 104.126.37.145
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.134
  • 40.126.32.136
  • 20.190.160.20
  • 20.190.160.14
  • 40.126.32.76
  • 20.190.160.22
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted

Threats

Found threats are available for the paid subscriptions
21 ETPRO signatures available at the full report
No debug info