File name:

XWorm v5.1-5.2.7z

Full analysis: https://app.any.run/tasks/fc48b6be-8873-4693-a9b1-7772ddf28d1b
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: July 28, 2024, 12:43:01
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
xworm
crypto-regex
ip-check
telegram
evasion
ransomware
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

76219B3556E25086FC52F8E2B93FBD0C

SHA1:

066A0F875820E51A60C3552A06B7B97F8BAB6BBC

SHA256:

FE6371034D55BB7583081B03F4AEC7274F8340CFEA4740325CB52E1C6AC77F6D

SSDEEP:

393216:BBRlgu0Rpq6CAotvhGhEib9axk26caKhhPiOLpjza1zG5dEYaC7Z3LvC:oTpq/LVsEa9yacaSaOD/NrC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • XWorm V5.2.exe (PID: 236)
      • vbc.exe (PID: 3816)
      • fun.exe (PID: 2116)
    • XWORM has been detected (YARA)

      • XWorm V5.2.exe (PID: 236)
      • XWormLoader 5.2 x64.exe (PID: 6120)
      • fun.exe (PID: 2116)
    • Create files in the Startup directory

      • fun.exe (PID: 2116)
    • Changes the autorun value in the registry

      • fun.exe (PID: 2116)
    • Uses Task Scheduler to run other applications

      • fun.exe (PID: 2116)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 1544)
      • fun.exe (PID: 2116)
    • Executable content was dropped or overwritten

      • XWorm V5.2.exe (PID: 236)
      • vbc.exe (PID: 3816)
      • fun.exe (PID: 2116)
    • Reads security settings of Internet Explorer

      • XWorm V5.2.exe (PID: 236)
      • XWormLoader 5.2 x64.exe (PID: 6120)
      • fun.exe (PID: 2116)
    • There is functionality for taking screenshot (YARA)

      • XWorm V5.2.exe (PID: 236)
      • XWormLoader 5.2 x64.exe (PID: 6120)
    • There is functionality for capture public ip (YARA)

      • XWorm V5.2.exe (PID: 236)
      • XWormLoader 5.2 x64.exe (PID: 6120)
    • Found regular expressions for crypto-addresses (YARA)

      • XWorm V5.2.exe (PID: 236)
      • XWormLoader 5.2 x64.exe (PID: 6120)
    • The process checks if it is being run in the virtual environment

      • XWormLoader 5.2 x64.exe (PID: 6120)
    • Checks for external IP

      • fun.exe (PID: 2116)
      • svchost.exe (PID: 2284)
    • Reads the date of Windows installation

      • fun.exe (PID: 2116)
    • The process executes via Task Scheduler

      • XClient.exe (PID: 5032)
      • XClient.exe (PID: 2480)
    • Creates files like ransomware instruction

      • fun.exe (PID: 2116)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1544)
    • Manual execution by a user

      • XWorm V5.2.exe (PID: 236)
      • WinRAR.exe (PID: 1544)
      • notepad.exe (PID: 3780)
      • cmd.exe (PID: 1044)
      • cmd.exe (PID: 3056)
      • cmd.exe (PID: 6736)
      • XWormLoader 5.2 x64.exe (PID: 6120)
      • fun.exe (PID: 2116)
      • firefox.exe (PID: 6284)
    • Reads the computer name

      • XWorm V5.2.exe (PID: 236)
      • identity_helper.exe (PID: 4984)
      • XWormLoader 5.2 x64.exe (PID: 6120)
      • fun.exe (PID: 2116)
      • XClient.exe (PID: 5032)
      • XClient.exe (PID: 2480)
      • identity_helper.exe (PID: 3628)
    • Create files in a temporary directory

      • XWorm V5.2.exe (PID: 236)
      • XWormLoader 5.2 x64.exe (PID: 6120)
      • vbc.exe (PID: 3816)
      • cvtres.exe (PID: 4044)
      • fun.exe (PID: 2116)
    • Checks supported languages

      • XWorm V5.2.exe (PID: 236)
      • identity_helper.exe (PID: 4984)
      • XWormLoader 5.2 x64.exe (PID: 6120)
      • vbc.exe (PID: 3816)
      • cvtres.exe (PID: 4044)
      • fun.exe (PID: 2116)
      • XClient.exe (PID: 5032)
      • XClient.exe (PID: 2480)
      • identity_helper.exe (PID: 3628)
    • Reads the machine GUID from the registry

      • XWorm V5.2.exe (PID: 236)
      • vbc.exe (PID: 3816)
      • fun.exe (PID: 2116)
      • XWormLoader 5.2 x64.exe (PID: 6120)
      • XClient.exe (PID: 5032)
      • XClient.exe (PID: 2480)
    • Reads Microsoft Office registry keys

      • XWorm V5.2.exe (PID: 236)
      • msedge.exe (PID: 6220)
      • msedge.exe (PID: 5956)
      • fun.exe (PID: 2116)
      • msedge.exe (PID: 524)
      • firefox.exe (PID: 2292)
    • Application launched itself

      • msedge.exe (PID: 6220)
      • msedge.exe (PID: 5956)
      • msedge.exe (PID: 524)
      • firefox.exe (PID: 6284)
      • firefox.exe (PID: 2292)
    • Attempting to use instant messaging service

      • msedge.exe (PID: 1700)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 3780)
    • Reads Environment values

      • identity_helper.exe (PID: 4984)
      • fun.exe (PID: 2116)
      • identity_helper.exe (PID: 3628)
    • Creates files in the program directory

      • XWormLoader 5.2 x64.exe (PID: 6120)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1544)
    • Disables trace logs

      • fun.exe (PID: 2116)
    • Checks proxy server information

      • fun.exe (PID: 2116)
    • Process checks computer location settings

      • fun.exe (PID: 2116)
    • Creates files or folders in the user directory

      • fun.exe (PID: 2116)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(2116) fun.exe
C2127.0.0.1:7000
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.2
MutexMwJPrAG9hwC93zd7
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
229
Monitored processes
95
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe #XWORM xworm v5.2.exe msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe conhost.exe no specs lodctr.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs notepad.exe no specs cmd.exe conhost.exe no specs lodctr.exe no specs msedge.exe no specs THREAT xwormloader 5.2 x64.exe conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs vbc.exe cvtres.exe no specs #XWORM fun.exe msedge.exe no specs svchost.exe schtasks.exe no specs conhost.exe no specs xclient.exe no specs xclient.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2652 --field-trial-handle=2384,i,12273082802963040522,1094875704472433082,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
236"C:\Users\admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe" C:\Users\admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
XWorm
Exit code:
0
Version:
5.2.0.0
Modules
Images
c:\users\admin\desktop\xworm\xworm v5.2\xworm v5.2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
396"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4328 --field-trial-handle=2328,i,12920897652499024020,4909608265636171409,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
524"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-windowC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
644"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4320 --field-trial-handle=2352,i,155157373925118058,11604796925487265841,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
752"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\admin\Desktop\How To Decrypt My Files.htmlC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exefun.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1044C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\XWorm\XWorm V5.2\Fixer.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
1112"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=4944 --field-trial-handle=2384,i,12273082802963040522,1094875704472433082,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1256"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5232 --field-trial-handle=2384,i,12273082802963040522,1094875704472433082,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1468"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5812 --field-trial-handle=2384,i,12273082802963040522,1094875704472433082,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
59 579
Read events
58 358
Write events
858
Delete events
363

Modification events

(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\XWorm v5.1-5.2.7z
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\Desktop
Executable files
127
Suspicious files
602
Text files
263
Unknown types
12

Dropped files

PID
Process
Filename
Type
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\Fixer.battext
MD5:2DABC46CE85AAFF29F22CD74EC074F86
SHA256:A11703FD47D16020FA099A95BB4E46247D32CF8821DC1826E77A971CDD3C4C55
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\Icons\icon (12).icoimage
MD5:4EA9AB789F5AE96766E3F64C8A4E2480
SHA256:84B48CA52DFCD7C74171CF291D2EF1247C3C7591A56B538083834D82857FEE50
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\Icons\icon (15).icoimage
MD5:E3143E8C70427A56DAC73A808CBA0C79
SHA256:B2F57A23ECC789C1BBF6037AC0825BF98BABC7BF0C5D438AF5E2767A27A79188
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\Icons\icon (13).icoimage
MD5:E6FEC4185B607E01A938FA405E0A6C6C
SHA256:2E2F17B7DD15007192E7CBBD0019355F8BE58068DC5042323123724B99AE4B44
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\Icons\icon (6).icoimage
MD5:D7C9666D30936E29CE156A2E04807863
SHA256:6EA04CF08751A2F6BB2F0E994258A44D5183B6CDB1471A0EE285659EADA045B5
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\GeoIP.datbinary
MD5:8EF41798DF108CE9BD41382C9721B1C9
SHA256:BC07FF22D4EE0B6FAFCC12482ECF2981C172A672194C647CEDF9B4D215AD9740
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\Background.pngimage
MD5:C93EE3ABEFF4AC24936471F80B36EC7A
SHA256:2F691CAFF7E1980CFB069D2608B6470B3A06CDB90467CE47820E8602115A0C5B
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\Icons\icon (11).icoimage
MD5:1C2CEA154DEEDC5A39DAEC2F1DADF991
SHA256:3B64B79E4092251EBF090164CD2C4815390F34849BBD76FB51085B6A13301B6D
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\Icons\icon (17).icoimage
MD5:167425A3FA7114B1800AA903ADC35B2A
SHA256:12F600B09C0DB00877684A950FC14936ECC28DF8F0DDC6821D68E4B82077AD92
1544WinRAR.exeC:\Users\admin\Desktop\XWorm\XWorm V5.1\Icons\icon (1).icoimage
MD5:4F409511E9F93F175CD18187379E94CB
SHA256:115F0DB669B624D0A7782A7CFAF6E7C17282D88DE3A287855DBD6FE0F8551A8F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
220
TCP/UDP connections
131
DNS requests
173
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
13.107.42.16:443
https://config.edge.skype.com/config/v1/Edge/122.0.2365.59?clientId=4489578223053569932&agents=Edge%2CEdgeConfig%2CEdgeServices%2CEdgeFirstRun%2CEdgeFirstRunConfig&osname=win&client=edge&channel=stable&scpfre=0&osarch=x86_64&osver=10.0.19045&wu=1&devicefamily=desktop&uma=0&sessionid=35&mngd=0&installdate=1661339457&edu=0&bphint=2&soobedate=1504771245&fg=1
unknown
GET
149.154.167.99:443
https://t.me/XCoderTools
unknown
GET
401
13.107.6.158:443
https://business.bing.com/api/v1/user/token/microsoftgraph?&clienttype=edge-omnibox
unknown
GET
94.245.104.56:443
https://api.edgeoffer.microsoft.com/edgeoffer/pb/experiments?appId=edge-extensions&country=US
unknown
OPTIONS
23.50.131.78:443
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
GET
304
204.79.197.239:443
https://edge.microsoft.com/abusiveadblocking/api/v1/blocklist
unknown
HEAD
200
23.53.42.201:443
https://assets.msn.com/statics/icons/favicon.ico
unknown
GET
200
204.79.197.239:443
https://edge.microsoft.com/entityextractiontemplates/api/v1/assets/find-assets?name=domains_config_gz&version=3.*.*&channel=stable&key=d414dd4f9db345fa8003e32adc81b362
unknown
text
265 b
GET
200
204.79.197.203:443
https://ntp.msn.com/bundles/v1/edgeChromium/latest/SSR-extension.aaffacfcbdc6bc9957ba.js
unknown
binary
27.0 Kb
GET
200
204.79.197.239:443
https://edge.microsoft.com/serviceexperimentation/v3/?osname=win&channel=stable&osver=10.0.19045&devicefamily=desktop&installdate=1661339457&clientversion=122.0.2365.59&experimentationmode=2&scpguard=0&scpfull=0&scpver=0
unknown
binary
791 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
131.253.33.254:443
a-ring-fallback.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.110.136:443
www.bing.com
Akamai International B.V.
DE
unknown
40.91.76.224:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
whitelisted
3952
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4132
OfficeClickToRun.exe
20.189.173.7:443
self.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
6220
msedge.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
a-ring-fallback.msedge.net
  • 131.253.33.254
unknown
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
www.bing.com
  • 2.16.110.136
  • 2.16.110.193
  • 2.16.110.170
  • 2.16.110.168
  • 2.16.110.176
  • 2.16.110.203
  • 2.16.110.195
  • 2.16.110.123
  • 104.126.37.144
  • 104.126.37.146
  • 104.126.37.137
  • 104.126.37.123
  • 104.126.37.139
  • 104.126.37.136
  • 104.126.37.130
  • 104.126.37.128
  • 104.126.37.152
  • 104.126.37.176
  • 104.126.37.160
  • 104.126.37.171
  • 104.126.37.178
  • 104.126.37.186
  • 104.126.37.179
  • 104.126.37.162
  • 104.126.37.185
  • 104.126.37.177
whitelisted
google.com
  • 142.250.185.206
whitelisted
self.events.data.microsoft.com
  • 20.189.173.7
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
t.me
  • 149.154.167.99
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted

Threats

PID
Process
Class
Message
1700
msedge.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
2748
msedge.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2748
msedge.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2284
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2284
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2116
fun.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
2116
fun.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
1 ETPRO signatures available at the full report
Process
Message
XWormLoader 5.2 x64.exe
Obfuscated!
XWormLoader 5.2 x64.exe
BeginReceive An existing connection was forcibly closed by the remote host