Overview
overview
10Static
static
10XWorm-RAT-...er.exe
windows10-2004-x64
3XWorm-RAT-...ox.dll
windows10-2004-x64
1XWorm-RAT-...er.bat
windows10-2004-x64
1XWorm-RAT-...I2.dll
windows10-2004-x64
1XWorm-RAT-...io.dll
windows10-2004-x64
1XWorm-RAT-...ip.dll
windows10-2004-x64
1XWorm-RAT-...ws.dll
windows10-2004-x64
1XWorm-RAT-...AC.dll
windows10-2004-x64
1XWorm-RAT-...OD.dll
windows10-2004-x64
1XWorm-RAT-...en.dll
windows10-2004-x64
1XWorm-RAT-...ks.dll
windows10-2004-x64
1XWorm-RAT-...ot.dll
windows10-2004-x64
1XWorm-RAT-...at.dll
windows10-2004-x64
1XWorm-RAT-...um.dll
windows10-2004-x64
1XWorm-RAT-...rd.dll
windows10-2004-x64
1XWorm-RAT-...er.dll
windows10-2004-x64
1XWorm-RAT-...ss.dll
windows10-2004-x64
1XWorm-RAT-...ts.dll
windows10-2004-x64
1XWorm-RAT-...ts.dll
windows10-2004-x64
1XWorm-RAT-...WD.dll
windows10-2004-x64
1XWorm-RAT-...ns.dll
windows10-2004-x64
1XWorm-RAT-...WD.dll
windows10-2004-x64
1XWorm-RAT-...il.dll
windows10-2004-x64
1XWorm-RAT-...er.dll
windows10-2004-x64
1XWorm-RAT-...er.dll
windows10-2004-x64
1XWorm-RAT-...la.dll
windows10-2004-x64
1XWorm-RAT-...DP.dll
windows10-2004-x64
1XWorm-RAT-...NC.dll
windows10-2004-x64
1XWorm-RAT-...fo.dll
windows10-2004-x64
1XWorm-RAT-...ll.dll
windows10-2004-x64
1XWorm-RAT-...er.dll
windows10-2004-x64
1XWorm-RAT-...ws.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:52
Behavioral task
behavioral1
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Command Reciever.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/FastColoredTextBox.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Fixer.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Guna.UI2.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/NAudio.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/7zip.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/ACTWindows.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/AskUAC.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/BSOD.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/BlankScreen.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Bookmarks.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Bot.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Chat.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Chromium.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Clipboard.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Clipper.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Cmstp-Bypass.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Computerdefaults.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/DeletePoints.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/DeleteWD.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/DicordTokens.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/DisableWD.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Email.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Encoder.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/FileSeacher.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/FileZilla.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/HRDP.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/HVNC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Info.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral30
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Install.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/Keylogger.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral32
Sample
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Plugins/KillWindows.dll
Resource
win10v2004-20240508-en
General
-
Target
XWorm-RAT-V2.1-main/XWorm RAT V2.1/Command Reciever.exe
-
Size
6.5MB
-
MD5
a21db5b6e09c3ec82f048fd7f1c4bb3a
-
SHA1
e7ffb13176d60b79d0b3f60eaea641827f30df64
-
SHA256
67d9b4b35c02a19ab364ad19e1972645eb98e24dcd6f1715d2a26229deb2ccf5
-
SHA512
7caab4f21c33ef90c1104aa7256504ee40ff0a36525b15eb3d48940862346ccf90a16eef87c06d79b0ffd920beb103ed380eae45df8c9286768890b15ed1067c
-
SSDEEP
98304:KAc94bqa9niwFYWLqDuTTTTTTdfPPpWLq+Guf2W2b6F72q0:KAcC9iwFYWuDCPPpWu+GduZ2L
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Command Reciever.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe -
Modifies registry class 20 IoCs
Processes:
Command Reciever.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Command Reciever.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Command Reciever.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Command Reciever.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
Command Reciever.exepid process 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Command Reciever.exepid process 4068 Command Reciever.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Command Reciever.exepid process 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe 4068 Command Reciever.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Command Reciever.exepid process 4068 Command Reciever.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Command Reciever.exepid process 4068 Command Reciever.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm-RAT-V2.1-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\XWorm-RAT-V2.1-main\XWorm RAT V2.1\Command Reciever.exe"1⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4068
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1552