analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe

Full analysis: https://app.any.run/tasks/957503e9-9f37-46b8-840d-09ee8e8e9f89
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: April 07, 2024, 07:33:31
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
xworm
remote
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

F267A71692C3683E3D6D0461E003F54F

SHA1:

189450A513D1F2412470EB965468F1324633D252

SHA256:

74531F459FDB6837669583DC731B7A6AFAD5378782AB8BCA5D726EDAC753F251

SSDEEP:

98304:bIgTMuB0kbmErby6Zbu2icuY8AvunEgMJJSLNrrjr/yDdpszicNpJgz0dVLvp7aA:8XX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
      • $77627d34 (PID: 7068)
      • $77627d34 (PID: 5128)
      • $77627d34 (PID: 2456)
    • Create files in the Startup directory

      • $77627d34 (PID: 7068)
    • Changes the autorun value in the registry

      • $77627d34 (PID: 7068)
    • XWORM has been detected (YARA)

      • $77627d34 (PID: 7068)
    • XWORM has been detected (SURICATA)

      • $77627d34 (PID: 7068)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
      • $77c86b15 (PID: 6104)
      • $77627d34 (PID: 7068)
      • $77ab271e (PID: 4480)
      • $77b083d3 (PID: 4080)
    • Process drops legitimate windows executable

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
      • $77627d34 (PID: 7068)
      • $77627d34 (PID: 5128)
      • $77627d34 (PID: 2456)
    • Reads security settings of Internet Explorer

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • $77627d34 (PID: 7068)
    • Reads the date of Windows installation

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • $77627d34 (PID: 7068)
    • The executable file from the user directory is run by the CMD process

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
    • Starts CMD.EXE for commands execution

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
    • Starts application with an unusual extension

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
      • $77627d34 (PID: 5128)
      • $77627d34 (PID: 2456)
    • Executes application which crashes

      • $77c86b15 (PID: 6104)
    • Starts itself from another location

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
      • $77627d34 (PID: 5128)
      • $77627d34 (PID: 2456)
    • Checks for external IP

      • $77627d34 (PID: 7068)
    • The process executes via Task Scheduler

      • $77627d34 (PID: 5128)
      • $77627d34 (PID: 2456)
    • Connects to unusual port

      • $77627d34 (PID: 7068)
  • INFO

    • Checks supported languages

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
      • $77c86b15 (PID: 6104)
      • $77627d34 (PID: 7068)
      • $77627d34 (PID: 5128)
      • $77ab271e (PID: 4480)
      • $77627d34 (PID: 2456)
      • $77b083d3 (PID: 4080)
    • Reads the computer name

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
      • $77627d34 (PID: 7068)
      • $77627d34 (PID: 5128)
      • $77ab271e (PID: 4480)
      • $77627d34 (PID: 2456)
      • $77b083d3 (PID: 4080)
    • Reads the machine GUID from the registry

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
      • $77627d34 (PID: 7068)
      • $77627d34 (PID: 5128)
      • $77ab271e (PID: 4480)
      • $77627d34 (PID: 2456)
      • $77b083d3 (PID: 4080)
    • Process checks computer location settings

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • $77627d34 (PID: 7068)
    • Creates files or folders in the user directory

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 3196)
      • WerFault.exe (PID: 7028)
      • $77627d34 (PID: 7068)
      • $77627d34 (PID: 5128)
      • $77ab271e (PID: 4480)
      • $77b083d3 (PID: 4080)
    • Create files in a temporary directory

      • 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe (PID: 6896)
      • $77627d34 (PID: 5128)
      • $77627d34 (PID: 2456)
    • Reads the software policy settings

      • WerFault.exe (PID: 7028)
      • slui.exe (PID: 1004)
    • Checks proxy server information

      • WerFault.exe (PID: 7028)
      • $77627d34 (PID: 7068)
      • slui.exe (PID: 1004)
    • Reads Environment values

      • $77627d34 (PID: 7068)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(7068) $77627d34
C2gamemodz.duckdns.org:6969
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameUSB.exe
Mutex7nYjxhsucshBdVBK
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

AssemblyVersion: 10.0.17763.1075
ProductVersion: 10.0.17763.1075
ProductName: Microsoft® Windows® Operating System
OriginalFileName: Mayfro.exe
LegalTrademarks: -
LegalCopyright: © Microsoft Corporation. All rights reserved.
InternalName: Mayfro.exe
FileVersion: 10.0.17763.1075
FileDescription: Runtime Broker
CompanyName: Microsoft Corporation
Comments: Runtime Broker
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 10.0.17763.1075
FileVersionNumber: 10.0.17763.1075
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x2582e6
UninitializedDataSize: -
InitializedDataSize: 2560
CodeSize: 2450432
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
TimeStamp: 2024:04:07 05:52:49+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
14
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe no specs cmd.exe conhost.exe no specs 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe no specs $77c86b15 werfault.exe #XWORM $77627d34 schtasks.exe no specs conhost.exe no specs $77627d34 no specs $77ab271e no specs slui.exe $77627d34 no specs $77b083d3 no specs

Process information

PID
CMD
Path
Indicators
Parent process
3196"C:\Users\admin\AppData\Local\Temp\74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe" C:\Users\admin\AppData\Local\Temp\74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Runtime Broker
Exit code:
0
Version:
10.0.17763.1075
Modules
Images
c:\users\admin\appdata\local\temp\74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7072"C:\WINDOWS\SysWOW64\cmd.exe" /k START "" "C:\Users\admin\AppData\Local\Temp\74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe" & EXITC:\Windows\SysWOW64\cmd.exe
74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.746 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1640\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6896"C:\Users\admin\AppData\Local\Temp\74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe" C:\Users\admin\AppData\Local\Temp\74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Runtime Broker
Exit code:
0
Version:
10.0.17763.1075
Modules
Images
c:\users\admin\appdata\local\temp\74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6104"C:\Users\admin\AppData\Local\Temp\$77c86b15"C:\Users\admin\AppData\Local\Temp\$77c86b15
74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Runtime Broker
Exit code:
3221225477
Version:
10.0.17763.1075
Modules
Images
c:\users\admin\appdata\local\temp\$77c86b15
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
7028C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6104 -s 408C:\Windows\SysWOW64\WerFault.exe
$77c86b15
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1081 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7068"C:\Users\admin\AppData\Local\Temp\$77627d34"C:\Users\admin\AppData\Local\Temp\$77627d34
74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Runtime Broker
Version:
10.0.17763.1075
Modules
Images
c:\users\admin\appdata\local\temp\$77627d34
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
XWorm
(PID) Process(7068) $77627d34
C2gamemodz.duckdns.org:6969
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameUSB.exe
Mutex7nYjxhsucshBdVBK
2712"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$77627d34" /tr "C:\Users\admin\AppData\Roaming\$77627d34"C:\Windows\SysWOW64\schtasks.exe$77627d34
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4084\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5128C:\Users\admin\AppData\Roaming\$77627d34C:\Users\admin\AppData\Roaming\$77627d34svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Runtime Broker
Exit code:
0
Version:
10.0.17763.1075
Modules
Images
c:\users\admin\appdata\roaming\$77627d34
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
11 784
Read events
11 745
Write events
37
Delete events
2

Modification events

(PID) Process:(3196) 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3196) 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3196) 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3196) 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6896) 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google
Operation:writeName:001
Value:
32
(PID) Process:(7028) WerFault.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
Operation:delete valueName:AmiOverridePath
Value:
C:\WINDOWS\AppCompat\Programs\Amcache.hve.tmp
(PID) Process:(7028) WerFault.exeKey:\REGISTRY\A\{570dcd8c-da4e-4b44-c65b-dcda209b3aec}\Root\InventoryApplicationFile
Operation:writeName:WritePermissionsCheck
Value:
1
(PID) Process:(7028) WerFault.exeKey:\REGISTRY\A\{570dcd8c-da4e-4b44-c65b-dcda209b3aec}\Root\InventoryApplicationFile\PermissionsCheckTestKey
Operation:delete keyName:(default)
Value:
(PID) Process:(7028) WerFault.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
Operation:writeName:ClockTimeSeconds
Value:
554C126600000000
(PID) Process:(7028) WerFault.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
Operation:writeName:TickCount
Value:
6BFD0D0000000000
Executable files
5
Suspicious files
3
Text files
962
Unknown types
0

Dropped files

PID
Process
Filename
Type
319674531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exeC:\Users\admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe.logtext
MD5:
SHA256:
689674531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exeC:\Users\admin\AppData\Local\Temp\$77c86b15executable
MD5:
SHA256:
7028WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFC42.tmp.dmpbinary
MD5:
SHA256:
7028WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFC92.tmp.WERInternalMetadata.xmlxml
MD5:
SHA256:
7028WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFCB2.tmp.xmlxml
MD5:
SHA256:
7028WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_$77c86b15_438468b6a5e58b1b82db3933706355d363de288_ce7108d4_d2321f78-043d-4210-84ed-c2b260c31029\Report.wer
MD5:
SHA256:
7028WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\$77c86b15.6104.dmpbinary
MD5:
SHA256:
689674531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exeC:\Users\admin\AppData\Local\Temp\$77627d34executable
MD5:
SHA256:
7068$77627d34C:\Users\admin\AppData\Roaming\$77627d34executable
MD5:
SHA256:
7068$77627d34C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77627d34.lnkbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
40
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7068
$77627d34
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
unknown
5272
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
unknown
4800
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
3996
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
6576
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
6576
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4828
svchost.exe
239.255.255.250:1900
unknown
1280
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6140
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3996
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3996
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
7028
WerFault.exe
52.168.117.173:443
umwatson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3996
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7068
$77627d34
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown
3996
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4800
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.31.69
  • 20.190.159.64
  • 20.190.159.4
  • 20.190.159.0
  • 20.190.159.2
  • 20.190.159.75
  • 20.190.159.73
  • 40.126.31.71
  • 20.190.159.23
  • 20.190.159.68
  • 40.126.31.67
  • 20.190.159.71
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
umwatson.events.data.microsoft.com
  • 52.168.117.173
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
ip-api.com
  • 208.95.112.1
shared
arc.msn.com
  • 20.223.36.55
whitelisted
gamemodz.duckdns.org
  • 45.128.96.133
malicious
slscr.update.microsoft.com
  • 20.12.23.50
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

PID
Process
Class
Message
7068
$77627d34
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
7068
$77627d34
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
7068
$77627d34
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
7068
$77627d34
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Initial Packet
12 ETPRO signatures available at the full report
No debug info