File name:

rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015

Full analysis: https://app.any.run/tasks/d7a315ca-18bb-4643-8ab8-6057c924eb88
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: July 06, 2025, 05:13:57
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
auto-reg
auto-startup
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

71BC1EAE25CF249A565579D41F76BCE6

SHA1:

F72522E2E319C982956D5A80D83E9B97009E64E7

SHA256:

F08F77C93C18F55C22C54418B22C4E658D1272F838572A2063796545BE6D2015

SSDEEP:

196608:NsnMUkXxE8/53m33z2GIhAo7jfYLEUK5i29:qn6BE853m33iGmA7ED

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • XWORM.exe (PID: 4984)
    • Create files in the Startup directory

      • XWORM.exe (PID: 4984)
    • XWORM has been detected (YARA)

      • XWORM.exe (PID: 4984)
    • Uses Task Scheduler to run other applications

      • XWORM.exe (PID: 4984)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
    • Executable content was dropped or overwritten

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Reads security settings of Internet Explorer

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Reads the date of Windows installation

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Checks for external IP

      • XWORM.exe (PID: 4984)
      • svchost.exe (PID: 2200)
    • There is functionality for taking screenshot (YARA)

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
    • Connects to unusual port

      • XWORM.exe (PID: 4984)
    • The process executes via Task Scheduler

      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 3936)
  • INFO

    • Reads the computer name

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 2996)
      • RuntimeBroker.exe (PID: 3936)
    • Process checks computer location settings

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Checks supported languages

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
      • RuntimeBroker.exe (PID: 2996)
      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 3936)
    • Create files in a temporary directory

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
    • Reads the machine GUID from the registry

      • XWORM.exe (PID: 4984)
      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 2996)
      • RuntimeBroker.exe (PID: 3936)
    • Reads Environment values

      • XWORM.exe (PID: 4984)
    • Disables trace logs

      • XWORM.exe (PID: 4984)
    • Checks proxy server information

      • XWORM.exe (PID: 4984)
      • slui.exe (PID: 6756)
    • Launching a file from the Startup directory

      • XWORM.exe (PID: 4984)
    • Launching a file from a Registry key

      • XWORM.exe (PID: 4984)
    • Creates files or folders in the user directory

      • XWORM.exe (PID: 4984)
    • Manual execution by a user

      • RuntimeBroker.exe (PID: 2996)
    • Reads the software policy settings

      • slui.exe (PID: 6756)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(4984) XWORM.exe
C2dudn.xyz:1000
Keys
AESHORIZON
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWORM 5.6
Mutexpj9NHo2Srl3u3xXq
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:03:20 10:01:29+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 307200
InitializedDataSize: 252928
UninitializedDataSize: -
EntryPoint: 0x32690
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe #XWORM xworm.exe svchost.exe schtasks.exe no specs conhost.exe no specs runtimebroker.exe no specs slui.exe runtimebroker.exe no specs runtimebroker.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1216\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2044"C:\Users\admin\Desktop\rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe" C:\Users\admin\Desktop\rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2996C:\Users\admin\AppData\Roaming\RuntimeBroker.exeC:\Users\admin\AppData\Roaming\RuntimeBroker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3936"C:\Users\admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\admin\AppData\Roaming\RuntimeBroker.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4984"C:\Users\admin\AppData\Local\Temp\RarSFX0\XWORM.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\XWORM.exe
rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\xworm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(4984) XWORM.exe
C2dudn.xyz:1000
Keys
AESHORIZON
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWORM 5.6
Mutexpj9NHo2Srl3u3xXq
6292"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "RuntimeBroker" /tr "C:\Users\admin\AppData\Roaming\RuntimeBroker.exe"C:\Windows\System32\schtasks.exeXWORM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6380"C:\Users\admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\admin\AppData\Roaming\RuntimeBroker.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6756C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
5 741
Read events
5 726
Write events
15
Delete events
0

Modification events

(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
51
Suspicious files
5
Text files
20
Unknown types
0

Dropped files

PID
Process
Filename
Type
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (14).icoimage
MD5:0C24EDEC606ABDA7C6570B7DCF439298
SHA256:8FC693238AFC49A8098DAC1762BFAE891E818BB84749C6EEF5F1B0C6C8FFDDB2
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\XWORM.exeexecutable
MD5:E71697132B7F2758D2266E26D688666B
SHA256:2D7D1248965834C6DB9B2347BEA8B825BD8587446BD0A1228D9D1CABE643F046
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\XWorm.exe.configxml
MD5:DA07C2AF754C1B46C1F46BEB4A5CD5C9
SHA256:60FDA282BBC1AEB836B158DD6DDE523E5225B365CC6FC0338DAB9E82347B1E2D
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (2).icoimage
MD5:F1463F4E1A6EF6CC6E290D46830D2DA1
SHA256:142B529799268A753F5214265C53A26A7A6F8833B31640C90A69A4FF94CEE5EC
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (13).icoimage
MD5:E6FEC4185B607E01A938FA405E0A6C6C
SHA256:2E2F17B7DD15007192E7CBBD0019355F8BE58068DC5042323123724B99AE4B44
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\SimpleObfuscator.dllexecutable
MD5:9043D712208178C33BA8E942834CE457
SHA256:B7A6EEA19188B987DAD97B32D774107E9A1BEB4F461A654A00197D73F7FAD54C
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (5).icoimage
MD5:9DBDD6972E129D31568661A89C81D8F9
SHA256:45C85BDAAF0E0C30678D8D77E2585871EA6D1298EE0D30037745BACEA6338484
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\XWorm.pdbbinary
MD5:0EB5AB214ECBAE527B9669B4B96573F5
SHA256:7A3CEA54A52C754453CD430D53816A6AD204D3C76125C9622560BB0541DC3BD3
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (17).icoimage
MD5:167425A3FA7114B1800AA903ADC35B2A
SHA256:12F600B09C0DB00877684A950FC14936ECC28DF8F0DDC6821D68E4B82077AD92
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (1).icoimage
MD5:4F409511E9F93F175CD18187379E94CB
SHA256:115F0DB669B624D0A7782A7CFAF6E7C17282D88DE3A287855DBD6FE0F8551A8F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
24
DNS requests
9
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6404
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4984
XWORM.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6404
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6404
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 172.217.18.110
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
dudn.xyz
  • 45.201.0.222
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 20.189.173.17
whitelisted

Threats

PID
Process
Class
Message
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
A Network Trojan was detected
ET MALWARE Common Stealer Behavior - Source IP Associated with Hosting Provider Check via ip.api .com
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
No debug info