Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
989s -
max time network
964s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 00:17
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
b80CM39qjZkNxfZ3
-
install_file
USB.exe
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2628-603-0x00000000013F0000-0x00000000013FE000-memory.dmp disable_win_def -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x00080000000235df-578.dat family_xworm behavioral1/files/0x00070000000235e8-588.dat family_xworm behavioral1/memory/2628-590-0x0000000000C10000-0x0000000000C1E000-memory.dmp family_xworm -
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/4416-572-0x0000018B6AF30000-0x0000018B6B124000-memory.dmp family_agenttesla -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2628 XClient.exe -
Loads dropped DLL 4 IoCs
pid Process 2628 XClient.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe -
Uses the VBS compiler for execution 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 32 camo.githubusercontent.com 33 camo.githubusercontent.com 34 camo.githubusercontent.com 29 camo.githubusercontent.com 30 camo.githubusercontent.com 31 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Xworm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Xworm V5.6.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1140 msedge.exe 1140 msedge.exe 740 identity_helper.exe 740 identity_helper.exe 3832 msedge.exe 3832 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4416 Xworm V5.6.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2472 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2472 AUDIODG.EXE Token: SeDebugPrivilege 2628 XClient.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 4416 Xworm V5.6.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe 4416 Xworm V5.6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4084 1140 msedge.exe 83 PID 1140 wrote to memory of 4084 1140 msedge.exe 83 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 3140 1140 msedge.exe 84 PID 1140 wrote to memory of 1904 1140 msedge.exe 85 PID 1140 wrote to memory of 1904 1140 msedge.exe 85 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86 PID 1140 wrote to memory of 1000 1140 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/d00mt3l/XWorm-5.61⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0b4346f8,0x7ffa0b434708,0x7ffa0b4347182⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4940
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4992
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4416 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gw3q4oaz\gw3q4oaz.cmdline"2⤵PID:2884
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES86FF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1FA26DDF7C4741BB85A0548AD7616A8A.TMP"3⤵PID:3904
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3800
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b4 0x4c01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51b1a6d076bbde5e2ac079ef6dbc9d5f8
SHA16aa070d07379847f58adcab6b5739fc97b487a28
SHA256eaadfbcafd981ec51c9c039e3adb4963b5a9d85637e27fd4c8cfca5f07ff8471
SHA51205b0cb3d343a5706434390fe863e41852019aa27797fe5d1b80d13b8e24e0de0c2cb6e23d15e89a0f427aaeaf04bf0239f90feb95bfc6913ca4dc59007e6659e
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5ceace37490300a09b219d07f9db098fa
SHA1b3bc8758f07de2860c84496c2f80ddcfc2aa4320
SHA256e3b815d4f73ce14f5607fc80edb9caebb784bcc93b53c6476a1ffcc31a0d2439
SHA51270c1dba61e7401b43edfe9da8b6db25a5f16d37d5a339c037121c426e47344ad353f71f297ba64e9c1d79f12466774c96076109c5e39ac3a65b068d0cdccb2ec
-
Filesize
989B
MD5f97e66fdd34e7d1ed305986bd15dbbff
SHA1e22fa362449cb6cb386aa49bb10c66678969d1fc
SHA256d63f1aaa283784dee6c6e3a4dd1ea60d4e151c3b18cd63b00c5fcc222fa999e0
SHA51236cf49dd058a6dd90f484b8eab7f52452b7a571932215dff8bbb68df6be0844dc7b73d17162051b905ab2eb91a018e50dc437397314f260c21661f52673cf437
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5b7bf41402f4fc9f712b57f93ddaf1ed3
SHA107eb8050be4cc6cf1cf57945c625d7bac7d135e8
SHA256a9b98e261b3b959fdbbc34c2c7cb66fee02a253f4ce681477bc19388a45ad65a
SHA5121c604517d4300e755f20bf34530864cdaa87ea68e725ca5954dd02949a18c40dac7866a173f43e5520f812426690061c13cffb17b44ac04d0af00881a2d6058c
-
Filesize
6KB
MD591c56189f40427ece243bb0fe6f8af59
SHA1e927c878a15099aa3af179e0471d77287479a58d
SHA2565ddb472d8ea3122a3ea31972770d40975b932c7b0410b40fadc2f3fa32148de7
SHA512da18098b7882510943f457c38a50e87d3292a639a494f5dd9972bab89e5caebc88a7dd70340580c670ad9b94f63417c6d39ce9b26b19592eb2e5c7efbccd71a1
-
Filesize
6KB
MD5539af6c08cfe7025f9ec4ad8ae514846
SHA108fcec31771a7e080b2233b8d9f465ec6226e4d8
SHA256b2fe1a6afaa73be0995dc583aa5067bf7ced8936021aef9f1896d2ca56d6306f
SHA512f0f865e24e6f6e282b23295a8822867c603b0e070a8946240100e68df6bd5e16e57b82af3665b0597d1588f5ab8b41a97466f094b488f6684cbbe96b107b2602
-
Filesize
7KB
MD5edc3811cdbf694b3f6196540b146289a
SHA1e0c4c7faf68f0ba1d0bba8158eaacc5df5850124
SHA25697356feb56acf4948afefddcde9b390f11e7b0e88f97daf5d3ab72b262ae32a1
SHA51287c426030716657144b3a6ec0ac29a875811eb0dcf9a2815231195f3fc2c0ac904293cd1201065bb403a1ed699e75b7fb75e87593afa54c5ca740796ddbac821
-
Filesize
1KB
MD53726110f680396d52c05f3d130b4f323
SHA14c849916b2758f3081d49271b58a387e599614e0
SHA256f2640a6fe472f8ff10fc9ea26f2c4e8816cc564a1c60a0c16f177c6f9b2a6edc
SHA51237968762802c164b5f0df947672546fec901e074016a366e7703afd6e74c89f39a2a5ac6dacea1e9b0c1956e87373aa0578f6deacf41fe18991024e017a98b83
-
Filesize
1KB
MD5a5b7d0365883fddaacfdccc724fd115c
SHA17820c374673de01a7252ea608d26e4e524967a6e
SHA256582ea223338c77402962d8011d727cce3dd2df4e1cefd602aaf996c3da8bc766
SHA512b6a17ad26aaa9e88e02e331cce64e56f989ddde6dee0337f54175ca66bba88ae5467d4ee8a8029fdde4c63be55f74710b8beb021fa0d955d8899f5764bd42c0d
-
Filesize
1KB
MD56eb1575d4d72bae3d81a1ff037dd071d
SHA121ad7751aaed4db016e6e217318c1c7104e699fc
SHA256bbaf10c3835efe6577af7c78cf45a4336250bd2881aee2aa7b801e40fa7a7535
SHA512dd8a27c299e02e9aeef156b3d8ad10a75af1cee0cc3e17a7ba00e531af725257a8a9d9110d882db7ce5c3b1ccb5cf99f8bc5cc3f4998a298e5b72b0dad393a75
-
Filesize
1KB
MD543a8992fee67a5298c81ef58a327b019
SHA1498c6c2cefdff8aa42bd640f751c5365c3c4656d
SHA256e7d570ce548fe2a741831441a4842a918669b344c1b861055e392e9cdff0262a
SHA512037510a7519a9b29864346eb33de198afbbb2c58af766c34e292f4ea512c7560679e8e8a7ad53491b511078198bb14e5213144049e89c4d87ebc46bc2c264ed2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f4ac1e07ea55aec01c4bf8254776cfd3
SHA13708a967712248551c057caee4bf8cd2fa7e769c
SHA25636ec48709b9d52c1c772bc36ba0eb5a54972b87eb46acb159649a15a04492404
SHA512d10a14e92f0e09d5b424a44e019eb8bfe885147f531446d4f36bfc4c543b1337531f568b779c46a454289900b25b280773a5f72f44a5ab2f43d8fc0a89cff996
-
Filesize
10KB
MD5dcc0db8d1b25b9a4e311d8c1fe4ff87b
SHA13853b3eef1fd6855661c6d02489676f5f1e29c12
SHA256f14f3acb827a41928b18cbc6dcd6762e8d5a66efebd57839268ec4b1fafb8109
SHA5128d8903935c47bc050b019a0173ca0f85e0dd5883bfa7abc39cd1d87d484b1b0bbea9f0b3003d52025b7caa7ea6c3df22906441ba5bce85abdfd3c3779cdc2d0a
-
Filesize
1KB
MD58d1bc7f422c8140fff9e5fe0862913b3
SHA11eebd275f368d3231bd80bbb3712d8644ef8d4f4
SHA256ec1efc74ff7d68c69a1337ed099acaf585359434ec4661b1f530555cdade3a85
SHA512e266459c002d5a3ac263c345c1098c7eade6886c584a7b073d47b5e7112cdb38b24f84087325f0fdd395ef49cb223a94bd7b8a075ef6849ced256bbe8595e0d9
-
Filesize
78KB
MD51b85c74206faa940d94ca83d07f9abca
SHA1dde178f562a3a58b3e8d3ad0bed63f83115262ab
SHA25665580ef492f6098ecaca5b3bd9064528585e65a17700014b8ae8922e3e1a5e95
SHA512509c4989fd9106f9324fffb35381ab6fe11301bbd4b68dad488671ab01c82784d1e89e2f86e553d911d4411cc1e206577bad9e8ee698926cfd1b8ae0ef642a27
-
Filesize
322B
MD5aef4137532af462f972d12020d20892d
SHA18b83344e605a9bddd7e18e31478a8c30a53e8715
SHA256cf383e85de61f4cb51d6c0909d155b16bd3c8dbaa96d6a36dbda423c4d207cb3
SHA5123ba79c8f98942c891bd5f55bba817a78a7121565880f6bdb8e486d1945b746feda625818808a70d2eb5266aaacd5f232c705dcfd0540030fc4fb94644072b03b
-
Filesize
100KB
MD51b942faa8e8b1008a8c3c1004ba57349
SHA1cd99977f6c1819b12b33240b784ca816dfe2cb91
SHA256555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc
SHA5125aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43
-
Filesize
1KB
MD5d40c58bd46211e4ffcbfbdfac7c2bb69
SHA1c5cf88224acc284a4e81bd612369f0e39f3ac604
SHA25601902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca
SHA51248b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68
-
Filesize
25.1MB
MD595c1c4a3673071e05814af8b2a138be4
SHA14c08b79195e0ff13b63cfb0e815a09dc426ac340
SHA2567c270da2506ba3354531e0934096315422ee719ad9ea16cb1ee86a7004a9ce27
SHA512339a47ecfc6d403beb55d51128164a520c4bea63733be3cfd47aec47953fbf2792aa4e150f4122994a7620122b0e0fc20c1eeb2f9697cf5578df08426820fecd
-
Filesize
32KB
MD531ae1ffe143ba598edc2f22eb8687dcc
SHA15b777dff864e03e7e629d2b7b7fa8ef0f488c32a
SHA256f38f8ef727c0a1eb82bb506a175e781d269a9021760870b33f2ac6689c074c72
SHA512ac5959336a9109b3d0b1dee9c99c946c1a8744d7d996e9002757778938de9c34aa1a60e5ecd41472b6e7360d73317eaa65eed0663d8fbb4bab76f746f3a9b435