File name:

SOSA_V3.exe

Full analysis: https://app.any.run/tasks/800dd5cb-6bf4-4f39-8ed1-6d9567846bc9
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: February 02, 2025, 16:02:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
xworm
remote
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

0525F1F43FB028BC1F99D5C2F61CBB70

SHA1:

464542A92BBBE5A74A718C64C2AF38873744B433

SHA256:

F3E0D9FA6553002027BE9C4D599AFD8255C7FD5042059BE43F69BD9C332CD586

SSDEEP:

98304:VbNLLIwmYGOs1WBsojh+6Yyg7bjHu+MAcWMI47tR8jXZ5yuIxmTssIM3AkScRmlF:VHVpNF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XWORM has been detected (SURICATA)

      • SOSA_V4.exe (PID: 3288)
    • XWORM has been detected (YARA)

      • SOSA_V4.exe (PID: 3288)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SOSA_V3.exe (PID: 5392)
    • Reads the date of Windows installation

      • SOSA_V3.exe (PID: 5392)
    • Executable content was dropped or overwritten

      • SOSA_V3.exe (PID: 5392)
      • SOSA.exe (PID: 3208)
    • The process drops C-runtime libraries

      • SOSA.exe (PID: 3208)
    • Process drops legitimate windows executable

      • SOSA.exe (PID: 3208)
    • Process drops python dynamic module

      • SOSA.exe (PID: 3208)
    • Application launched itself

      • SOSA.exe (PID: 3208)
    • Loads Python modules

      • SOSA.exe (PID: 5040)
    • Connects to unusual port

      • SOSA_V4.exe (PID: 3288)
    • Contacting a server suspected of hosting an CnC

      • SOSA_V4.exe (PID: 3288)
    • Starts CMD.EXE for commands execution

      • SOSA.exe (PID: 5040)
  • INFO

    • Create files in a temporary directory

      • SOSA_V3.exe (PID: 5392)
      • SOSA.exe (PID: 3208)
    • Reads the computer name

      • SOSA_V3.exe (PID: 5392)
      • SOSA_V4.exe (PID: 3288)
      • SOSA.exe (PID: 3208)
    • Checks supported languages

      • SOSA_V3.exe (PID: 5392)
      • SOSA_V4.exe (PID: 3288)
      • SOSA.exe (PID: 3208)
      • SOSA.exe (PID: 5040)
    • Reads the machine GUID from the registry

      • SOSA_V3.exe (PID: 5392)
      • SOSA_V4.exe (PID: 3288)
    • Process checks computer location settings

      • SOSA_V3.exe (PID: 5392)
    • The sample compiled with english language support

      • SOSA.exe (PID: 3208)
    • PyInstaller has been detected (YARA)

      • SOSA.exe (PID: 3208)
      • SOSA.exe (PID: 5040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(3288) SOSA_V4.exe
C2193.161.193.99:31297
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.2
MutexRMg5zSGdA7hHDvj4
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:02:02 15:55:51+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 6469632
InitializedDataSize: 434688
UninitializedDataSize: -
EntryPoint: 0x62d68e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: SOSA_V3.exe
LegalCopyright:
OriginalFileName: SOSA_V3.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
7
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start sosa_v3.exe #XWORM sosa_v4.exe sosa.exe conhost.exe no specs sosa.exe no specs cmd.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3208"C:\Users\admin\AppData\Local\Temp\SOSA.exe" C:\Users\admin\AppData\Local\Temp\SOSA.exe
SOSA_V3.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\sosa.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3288"C:\Users\admin\AppData\Local\Temp\SOSA_V4.exe" C:\Users\admin\AppData\Local\Temp\SOSA_V4.exe
SOSA_V3.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\sosa_v4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(3288) SOSA_V4.exe
C2193.161.193.99:31297
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.2
MutexRMg5zSGdA7hHDvj4
4136C:\WINDOWS\system32\cmd.exe /c cls & title SOSA CARD GEN BY lcm_2080C:\Windows\System32\cmd.exeSOSA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
4716C:\WINDOWS\system32\cmd.exe /c clsC:\Windows\System32\cmd.exeSOSA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
5040"C:\Users\admin\AppData\Local\Temp\SOSA.exe" C:\Users\admin\AppData\Local\Temp\SOSA.exeSOSA.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\sosa.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5320\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSOSA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5392"C:\Users\admin\Desktop\SOSA_V3.exe" C:\Users\admin\Desktop\SOSA_V3.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\sosa_v3.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
1 171
Read events
1 171
Write events
0
Delete events
0

Modification events

No data
Executable files
14
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3208SOSA.exeC:\Users\admin\AppData\Local\Temp\_MEI32082\_hashlib.pydexecutable
MD5:787B82D4466F393366657B8F1BC5F1A9
SHA256:241322647BA9F94BDC3AE387413FFB57AE14C8CF88BD564A31FE193C6CA43E37
3208SOSA.exeC:\Users\admin\AppData\Local\Temp\_MEI32082\_ctypes.pydexecutable
MD5:9B344F8D7CE5B57E397A475847CC5F66
SHA256:B1214D7B7EFD9D4B0F465EC3463512A1CBC5F59686267030F072E6CE4B2A95CF
3208SOSA.exeC:\Users\admin\AppData\Local\Temp\_MEI32082\_decimal.pydexecutable
MD5:692C751A1782CC4B54C203546F238B73
SHA256:C70F05F6BC564FE400527B30C29461E9642FB973F66EEC719D282D3D0B402F93
5392SOSA_V3.exeC:\Users\admin\AppData\Local\Temp\SOSA_V4.exeexecutable
MD5:30E731DB41610AFCFE00123B4F56E0E1
SHA256:5DD036AFE99DE1AB57BC7EDDDFE4A7C399D8A52C14B76BDF838ADFBFD4BDA87D
3208SOSA.exeC:\Users\admin\AppData\Local\Temp\_MEI32082\VCRUNTIME140.dllexecutable
MD5:4585A96CC4EEF6AAFD5E27EA09147DC6
SHA256:A8F950B4357EC12CFCCDDC9094CCA56A3D5244B95E09EA6E9A746489F2D58736
3208SOSA.exeC:\Users\admin\AppData\Local\Temp\_MEI32082\_socket.pydexecutable
MD5:26DD19A1F5285712068B9E41808E8FA0
SHA256:EAABF6B78840DAEAF96B5BDBF06ADF0E4E2994DFEEE5C5E27FEFD824DBDA5220
3208SOSA.exeC:\Users\admin\AppData\Local\Temp\_MEI32082\libcrypto-1_1.dllexecutable
MD5:9D7A0C99256C50AFD5B0560BA2548930
SHA256:9B7B4A0AD212095A8C2E35C71694D8A1764CD72A829E8E17C8AFE3A55F147939
3208SOSA.exeC:\Users\admin\AppData\Local\Temp\_MEI32082\_lzma.pydexecutable
MD5:0C7EA68CA88C07AE6B0A725497067891
SHA256:F74AAF0AA08CF90EB1EB23A474CCB7CB706B1EDE7F911DAF7AE68480765BDF11
3208SOSA.exeC:\Users\admin\AppData\Local\Temp\_MEI32082\_bz2.pydexecutable
MD5:A62207FC33140DE460444E191AE19B74
SHA256:EBCAC51449F323AE3AE961A33843029C34B6A82138CCD9214CF99F98DD2148C2
5392SOSA_V3.exeC:\Users\admin\AppData\Local\Temp\SOSA.exeexecutable
MD5:4ECD7183076C4D8229664CEE5199DDE1
SHA256:203B1ECDBCD0747B3C8E3FDD19A92E49A7E35054AE85B615B12EB8CB7248BED0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
18
DNS requests
5
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2380
svchost.exe
GET
200
95.101.78.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.78.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2380
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2.16.204.152:443
Akamai International B.V.
DE
unknown
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2380
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2380
svchost.exe
95.101.78.42:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.78.42:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2380
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3288
SOSA_V4.exe
193.161.193.99:31297
OOO Bitree Networks
RU
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 95.101.78.42
  • 95.101.78.32
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
self.events.data.microsoft.com
  • 51.132.193.105
whitelisted

Threats

PID
Process
Class
Message
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
No debug info