Resubmissions
09-01-2025 19:49
250109-yjtbhs1nck 1009-01-2025 19:48
250109-yjlaxa1nbq 309-01-2025 18:48
250109-xf75tszlcj 1009-01-2025 18:45
250109-xeef5azkfp 1009-01-2025 18:34
250109-w7sc1szjak 1009-01-2025 18:31
250109-w54y2axkf1 1003-01-2025 17:08
250103-vntw3atqdt 1003-01-2025 15:27
250103-svv2latmgr 1003-01-2025 15:23
250103-sslp5stlhk 10Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 17:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Command Reciever.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation conhost.exe -
Executes dropped EXE 2 IoCs
pid Process 4084 Command Reciever.exe 1736 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 4084 Command Reciever.exe 1736 conhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate\\conhost.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 88 raw.githubusercontent.com 90 raw.githubusercontent.com 96 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4780 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier conhost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4328 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4540 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 4680 msedge.exe 4680 msedge.exe 3660 identity_helper.exe 3660 identity_helper.exe 5064 msedge.exe 5064 msedge.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 4084 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 2840 Command Reciever.exe 1736 conhost.exe 1736 conhost.exe 1736 conhost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4084 Command Reciever.exe Token: SeDebugPrivilege 4780 tasklist.exe Token: SeDebugPrivilege 1736 conhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 2840 Command Reciever.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1736 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 2988 4680 msedge.exe 83 PID 4680 wrote to memory of 2988 4680 msedge.exe 83 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 4504 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 85 PID 4680 wrote to memory of 3996 4680 msedge.exe 85 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86 PID 4680 wrote to memory of 2556 4680 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Intestio/XWorm-RAT/releases/tag/xworm1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1b3f46f8,0x7ffd1b3f4708,0x7ffd1b3f47182⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵PID:1492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4556
-
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4920 -
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp622B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp622B.tmp.bat3⤵PID:4796
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:4116
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4084"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:3044
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:4328
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f5⤵PID:3192
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:4540
-
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD512b1b0e6e67006ac2890b6fece790fd6
SHA1e181cc474462ae3682e26121031408fa1a11bf18
SHA2566d3806fe795d496f653d4e2282c1c9a425d1fc796517828ea2938a0496f85388
SHA512dd6ed70d3dfa05eef3439fb7a4d0d8909dcd2d36f68e4fb5f1df3786443b926a17222fb71e3a6659f7e117a026a79bddeb7f8912e129cbe93bbc241a40dec256
-
Filesize
124KB
MD56c1638c52aafa60a916064fe42406263
SHA1eff3474affe77a3964a3978e0082e13ac4073d8c
SHA2561d14203d0b5e5a2c7907f71f263f219b2f30f74d389f58913c6000aace277eef
SHA512f532a261da329e08a8167a6ff0ae3a46f0847a7d559928000d24090b90be34c2e6628b8cc876a177208042891fd35093c31893e81a972294ead19e9dfc84296e
-
Filesize
573B
MD50f10f06a81301fb5628cf7095431d223
SHA1793e4d73149ed5ad1c272b223566b4a860585584
SHA2564a82c65721bd568267f01cfbd6b3d29ddbc548514c8d8067e755bbbf243adf75
SHA512b11e42a2671ee99b0efc2a0833508797727fda177a32d652366b550873ef31b18920c87abb9edf87f441a49c4f2591cd667e8482a3541a854ee9aba4805b5593
-
Filesize
5KB
MD5d38be4a745771c971984c7e3521ef484
SHA11e8336ed2a233a4a3e92b43ab38763dd07e0e3a4
SHA25609e7f764a4455e92ea4782a73ada9a1dfd06241c4ab9061ec163e58570a090e4
SHA512db5153ef3faefef7e35120cb8e542d23d2bb248b31d2db3575d1ac7e3a65073cd440ef3fe3087e9750163d70fc0347048133947cb1e107529897331b62e87a20
-
Filesize
6KB
MD54a66687653613b4d439ac8d5e4373386
SHA103f6ac899557440ce5fa896ae194b0addb38b1ea
SHA256fa142b7f00de52773842febfdb58874a001b0d1663fd4ab5dec89876b81bfccc
SHA5122a6668a64da9a855159dbff51ad2864594fdb25bce71ee30d36bacc1189bf93547176c5f497b9c5edf29cc80f427243f97e6216d256b90a967c63f0d7d94eb8f
-
Filesize
6KB
MD541a3ead36c001d88dc85b7ce74de7c49
SHA1462125c2dea0798bf864a539358ebd7b76c44a2f
SHA2565635e8420114561c83a2c63b911d8f967fd9d5fa8aafbacd057ec3af12259032
SHA512c6ddd6133c5aa7f6c082988250606d691c855eaf8b88092840cf730a17c149dfb35ea907ee02e8bc79ec23069d3d47c0f1f662aa712814902ea5a586addcc2b1
-
Filesize
1KB
MD510c61d083f70b358131f658f0eeb51e2
SHA16649855821c73b877e9505230594d2a0fce56a04
SHA256a2a67f3ef1be9cd4f8a6f097c3f2c12a46ad97c055ede93b3dcc9c0b7b22e549
SHA512765274f38b7de226ee76395b56e1f78cfada2a0b17abc5063cc5e881692b2fecec4261913098ba00527ccebcf5e496d32a166fd3f6ca09fa1cf491b05d707b24
-
Filesize
866B
MD57650ac34fd52c172825f46fc7af909a0
SHA1da08a4f1f980533420649c555423576a57a85085
SHA256ec28127ac354a7fc66b9e4b5bbd931c56a30cc0b9a83e9454573598a39a676d2
SHA512e4b1d9ccaf6efeb540a821323d91cfe4d8df841bc9300bbdd1166517b7efa9aa1eb26db30c044367a560b54386fa33c01935f506399a02073b20140940767c7d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5669121731d318917af1fcbf800b76ef4
SHA1bc9def88882f1b274599a0b8b4e24ca271a26417
SHA256efb2f22be685747b2a7509b4aaac2440555955b14cc695a5506e29ab4f026dc3
SHA51240a2fd97e5094523f03bb6117167f86d322bf0b1e749b5986b3a9c52152862b2b5d9569f8accc255b3a4a6f33e956f27ee8237fe4d0f5cbf82878fd4d77f6166
-
Filesize
10KB
MD59522a604e72d8593104c345a55cac911
SHA1d0b530ccdbbe2ff735170db76f18aedbfc913541
SHA256307c0e6d953b65f890350b4c65e93362bd16ec2a757279479a64b3e72247397d
SHA512495fea16ccc9192ccb293d2b877924fc94b0532866ea0905df3927a2d4a9f8715ef545c69469a21265955c9c43b68f7931bf17d0620c59c5714d2908c0a7138e
-
Filesize
10KB
MD5405d66c4876f2273d2cc55caf777022b
SHA17a0c441825b6238e2579b42797b06bea3cc7edad
SHA256ee6d3a457ab75eee4f378c74e57dd0919a9d62a9bf1e2082ab06bb032ba2eeb6
SHA5120a5dba9a8b915497c34978cb5fa1a0ef822899b13559e43fa0c3455ca0a0e536554357dc04710cdbcd06fafcde7f962c2a3d6ed9f2c1df0366d962d5d04476e2
-
Filesize
10KB
MD539c2a9e49a0bba8f26baf85a1649dc5b
SHA1a4e58bf6e735be985b7a98a81a4a52edf1decfaa
SHA25642c4f6cfcb862b1e851911d8b409917b1050ece58d4ca474c95de7ef3dc9a5e3
SHA5121969345832c2507bba495b68753ec4e09713b8ac8e60ab482bfc33128a586d46ade99abc78b1a67cebf1fcc365802decc1c134fa45c1d60d4ca60b4b30d6fd9e
-
Filesize
5.6MB
MD5eb01eece5f0887b24a1bd53183d801dc
SHA149e92aee8351e3a995d8ec95bc64d7f381dcee28
SHA256a2b1012a39662b760415ee897388c862457f4f1672897db8dee67e125bf0ad5c
SHA51283374fdc381d52b64682df5b96f02cb3d487ce12d9231ede8ee9a92ecf72fa4a0d6f91a04e5f6656cccd50f142dd44bbb08e7ecc94b647e0349064dc32a76839
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
295B
MD59a5c9913ac53c77342c3499bec9adf3d
SHA1a547eba9e586a9ab052af7487882d12d55b01519
SHA2567417b6f7b60cceec14cc0801083996ecf9b721d105f8d0bcafeaf4069e52f896
SHA5122ff2ff0c9319b5ba06c776561cd1f6c5a03e12da5bd0b0e488a4a062d61beadacc5af8a7f9aa05ff7f8d3e0c7d11861e9b096f868777ff6dc3a79eedbd9c3e73