Post

When Cat Pictures Take More Than Just Your Time

When Cat Pictures Take More Than Just Your Time

Lately, I’ve been trying to balance the grind of learning assembly with reading up on the latest malware happenings. But like all good things they must be done in moderation (I got distracted). That’s when I found myself, like most people, using the internet to look at cat pictures and downloading malware. That’s when I came across something that had the potential to be both! A sample on Malware bazaar that had the filename screenshot1_915162331.jpeg.exe. My first thought was “this could have been mr.mittens.jpeg.exe”. and someone would have had a really bad day. Naturally, I jumped in.

As you can see this malware tries to deceive its victim right off the bat with a filename ending in .jpeg.exe.

Malware Bazaar

Pro Tip

I know you’re thinking, “well it says its an exe plain as day”, and your not wrong. The full filename clearly shows that it is an executable, however, most operating systems don’t show extensions by default, so this would look like a normal .jpeg file which most people wouldn’t second guess was anything but a picture.

Let me show you with a file I just made.

Show extensions on: Extensions on Show extensions off: Extensions off

As you can see from the second image above the file is able to masquerade its self as a normal .jpeg by simply changing its name.

You can usually make this change yourself in your file explorers view settings.

Checkbox

Initial look

Lets get this thing over to FlareVM and see what it’s trying to do. Detect It Easy (DIE) shows that this file is actually a Self Extracting Archive (SFX).

DIE Zip Before possibly getting myself infected by just unzipping it, I decided to do a bit of research into SFXs. An SFX is an executable program that both contains the compressed data and decompresses it. When double clicked It executes a stub that will carry out the decompression and can be further configured to continue with installation instructions; in this case run a malicious executable. Come to find out the safest way to handle one of these is to treat it like a normal zip file and extract it yourself, not allowing the SFX to do it for you and executing the malware.

And there it is, the malicious executable named loader.exe.

Extracted

Accompanied with a cheeky little message from mister skiddie themself.

Skid Img

Running the executable through DIE it tells me that it is a .net application, its obfuscated, and has anti analysis!

DIE net

The Analysis

Time to throw this thing into dnSpy and start tearing it apart. As usual our launching point is the entry point.

Entry Point That led me straight to what I recognized as the configuration that needs to be resolved before anything is carried out. I set a break point right before the exception, which would have exited the program if I would have set it any lower.

Breakpoint And just like that we have the configuration settings: C2 host, port, install location, and more.

The goods

This time around I am renaming the fields so it will be easier for me to understand the flow of the malware. This way while looking around my naming scheme will jump out to me.

First Rename With the config completely renamed, lets move on to what exactly this thing is capable of.

Config Rename

Right after setting up its settings the malware does a check for its mutex to make sure it isn’t already running, runs through an anti analysis method, and sets Microsoft defender exclusions.

Forst steps

The anti analysis method checks for both Virtual Box , Sandboxie, and VmWare virtual environments. The checks include whether it’s being debugged, if the operating system is windows xp or not, then finally checks the geo location of the victim.

Anti Analysis

The malware then goes on to set Microsoft defender exclusions using powershell. It sets exclusions for the original file location, its current process, the install path, and the the malicious process itself svchost.exe.

Defender Exclusions

After the exclusions are set it then moves on to create persistence within the system by creating a scheduled task that will run every minute whether or not the user is an administrator and a startup registry key entry.

Persistence

Once all that is set up it starts conducting its nefarious deeds, such as starting up its keylogger and crypto clipper.

Keylogger and Clipper

I was curious about what crypto clipper was so I did some research on it. After some digging I found that since crypto wallets are very long and hard to type most people will copy and paste them when doing transactions. This is where crypto clippers come in; it will monitor the victims clipboard for a wallet address and replace it with the threat actors.

Crypto Clipper

The picture that came with this malware also mentioned the ability to blue screen the victims computer, so I looked into just how they were accomplishing that as well. From what I could find it will set the process as a critical process using RtlSetProcessIsCritical and then terminate it causing a stop error code CRITICAL_PROCESS_DIED (0xEF).

BSOD

Digging further down I also found command and control (C2) functionality. Commands like shutdown, restart, and shell interaction. It also has the capability to use the victims machine as part of DDOS attacks. Not included in the screenshot, there seemed to be ways to load plugins to expand its C2 capabilities further.

C2_Commands

The DDOS function basically turns the victim into a bot used to target websites; shown below hosts, ports, and a duration(num) are accepted as arguments. This gets sent to a while loop that will connect to the site specified by host over and over for the duration that is specified via the timeSpan and stopwatch comparison.

DDOS

There was also a cleanup method that would delete itself, its registry key entry, scheduled task, and then move into the BSOD method. Meaning that once the attacker is done using your computer they leave you with a blue screen.

Cleanup

Some CTI

Shodan shows that the IP address of the host is based out of France with a decent amount of ports open, although none match what was found in the sample.

Shodan

Only 16 out of 94 vendors have reported this host malicious to Virus Total with similar results for the ip address. I voted and left comments for both the hostname and ip address.

VT

According to Microsoft Xworm is linked to the ClickFix campaign that has been extremely prevalent in 2026.

From Cat pics to Takeovers

If nothing else, this post goes to show just how volatile the internet can be. One minute your browsing cat pics and the next some loser is in your computer. All in all, analyzing this sample of Xworm was really fun. Going through and renaming everything sent me from one “aha” moment to the next, granting me just the right amount of dopamine along the way. Now with my distractions out of the way it’s back to learning assembly, and hopefully posting my first analysis of a malware sample not built with .net soon.

IOC

MITRE ATT&CK and Malware Behavior Catalog

brought to you by Mandiant Capa

Hashes:

SHA256 hash:0aaff85b11f5cc5930d012c17075f74dec16e9ad19b9fa729254d5e60961810a 
SHA3-384 hash:0887a385c55630ce179773feeec2f9d5d8993b90f91f460460b81808af32888e6836efcaa7ca42cc4cca3c61646d634a 
SHA1 hash:788e2d094284f2055636c5666fae81e83216f53b 
MD5 hash:29bc6b886b8b307f655cf2129be0ec01 
File name:screenshot1_915162331.jpeg.exe 
pictures.JPG SHA256:a9f5657db279ece081a926ac8a4575b1e55d02c4232676b5dabdbdc7e7fee57f 
loader.exe:e4d6c94e315a3a5dc3f902b12011e9c5d501c347c5d0922dd88e8d1dd11e88a5 
Host:zqw16kp0nv[.]localto[.]net 
IP:158[.]178[.]201[.]63 
Port:3472 
Mutex:nwtXPTlq2LciVh3u 
Version:XWorm V5.6 
Install Location:%AppData%\Roaming\svchost.exe 
This post is licensed under CC BY 4.0 by the author.