File name:

PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr

Full analysis: https://app.any.run/tasks/a4d84214-b2e8-493f-a041-8051669a273c
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: April 29, 2025, 03:51:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
remote
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

A6411B2C0B54C794244CA7F6702F82F6

SHA1:

0A2705F02D76AB00980825CF918A0083E7FCA67A

SHA256:

F1C4F048A0B4996A97160ECFAD75FCC84815261916A4357DDB83A78F5FB6D78D

SSDEEP:

24576:0krv8gkkrvefEiF93v5IKLnsCRXczVJ0VN+YGyUStdFYl+h42vCioU2:0krv8gkkrvefEiF93v5IKLnsC1czVJ0g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
    • XWORM has been detected (YARA)

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
    • XWORM has been detected (SURICATA)

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
  • SUSPICIOUS

    • Application launched itself

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 6108)
    • Executable content was dropped or overwritten

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
    • Connects to unusual port

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
    • Contacting a server suspected of hosting an CnC

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
  • INFO

    • Checks supported languages

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 6108)
    • Reads the computer name

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 6108)
    • Reads the machine GUID from the registry

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 6108)
      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
    • Creates files or folders in the user directory

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
    • Auto-launch of the file from Startup directory

      • PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe (PID: 7148)
    • Reads the software policy settings

      • slui.exe (PID: 6656)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(7148) PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe
C2104.250.180.178:7061
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.2
MutexXczLagvCjDnYaiUQ
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:29 02:37:13+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 601088
InitializedDataSize: 10752
UninitializedDataSize: -
EntryPoint: 0x94aa2
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Engaging word puzzle game with multiple challenge levels and vocabulary enhancement
CompanyName: Phantom Dimension Software
FileDescription: LexiQuest Deluxe
FileVersion: 1.0.0.0
InternalName: mIYg.exe
LegalCopyright: Copyright © Phantom Dimension Software 2025
LegalTrademarks: LexiQuest™
OriginalFileName: mIYg.exe
ProductName: LexiQuest Deluxe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.3.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start packing & invoice - so.4208 - po wk16  tpes25040659.scr.exe no specs sppextcomobj.exe no specs slui.exe #XWORM packing & invoice - so.4208 - po wk16  tpes25040659.scr.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1128C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5968C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6108"C:\Users\admin\AppData\Local\Temp\PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe" C:\Users\admin\AppData\Local\Temp\PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exeexplorer.exe
User:
admin
Company:
Phantom Dimension Software
Integrity Level:
MEDIUM
Description:
LexiQuest Deluxe
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\packing & invoice - so.4208 - po wk16 tpes25040659.scr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6656"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7148"C:\Users\admin\AppData\Local\Temp\PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe"C:\Users\admin\AppData\Local\Temp\PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe
PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe
User:
admin
Company:
Phantom Dimension Software
Integrity Level:
MEDIUM
Description:
LexiQuest Deluxe
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\packing & invoice - so.4208 - po wk16 tpes25040659.scr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
XWorm
(PID) Process(7148) PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe
C2104.250.180.178:7061
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.2
MutexXczLagvCjDnYaiUQ
Total events
1 607
Read events
1 607
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7148PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exeC:\Users\admin\AppData\Roaming\XClient.exeexecutable
MD5:A6411B2C0B54C794244CA7F6702F82F6
SHA256:F1C4F048A0B4996A97160ECFAD75FCC84815261916A4357DDB83A78F5FB6D78D
7148PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkbinary
MD5:3DA7FC63AAD91CF764DD34E3ED233B13
SHA256:BE852AB64FE66BEFF2FC565EEC1469CCA0CE4A610EAC4839110B4D08BF1DBB1A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
15
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1764
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1764
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.72
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.142
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.128
  • 40.126.31.3
  • 40.126.31.69
  • 20.190.159.75
  • 40.126.31.128
  • 20.190.159.23
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
7148
PACKING & INVOICE - SO.4208 - PO WK16 TPES25040659.scr.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
No debug info