Saturday, December 13, 2025

Windows Users Targeted by New XWorm V6 Variant Featuring Anti-Analysis Tactics

Cybersecurity researchers at Netskope Threat Labs have discovered a new version of the XWorm malware, designated as version 6.0, which introduces enhanced evasion capabilities and process protection mechanisms targeting Windows systems

This latest variant represents a significant evolution from the previously documented version 5.6, incorporating sophisticated anti-analysis techniques that demonstrate the malware’s continued active development and refinement by threat actors.

Enhanced Infection Chain and AMSI Bypass Capabilities

The XWorm 6.0 infection begins through a VBScript file delivered via social engineering campaigns, employing a multi-stage obfuscation process that reconstructs malicious payloads at runtime

The initial VBScript utilizes character code arrays processed in reverse order using UBound, converting numeric values to Unicode characters through VBScript’s ChrW function before concatenating and executing the payload via the eval function.

A critical advancement in this version is the implementation of Antimalware Scan Interface (AMSI) bypass functionality through in-memory modification of the Common Language Runtime library (CLR.DLL)

The PowerShell script systematically retrieves system memory information, iterates through all memory regions of the current process, and searches for the “AmsiScanBuffer” string within CLR.DLL, subsequently replacing it with null bytes

This technique prevents the CLR from resolving the AmsiScanBuffer method, effectively blocking AMSI from inspecting suspicious memory content.

Process Protection and Advanced Anti-Analysis Features

XWorm 6.0 introduces a notable process protection mechanism by marking itself as a critical system process when executed with administrator privileges

The malware verifies elevated permissions by checking if the current user belongs to the WindowsBuiltInRole.Administrator group (value 544), then invokes EnterDebugMode to enable SeDebugPrivilege

This critical process designation prevents standard users from terminating the malware, and forceful termination by elevated users results in system crashes requiring reboots.

The malware incorporates multiple anti-analysis techniques, including automatic termination when detecting execution on Windows XP systems, potentially to prevent analysis in legacy sandbox environments

Additionally, XWorm employs the IP-API service to determine if the device’s IP address originates from data centers or hosting providers, terminating execution if such infrastructure is detected.

For persistence, XWorm 6.0 modifies its approach from the scheduled task method used in version 5.6, instead copying the update.vbs file to both TEMP and APPDATA folders and adding these paths to the registry run key

This evolution demonstrates the malware’s adaptive capabilities and suggests continued refinement of techniques to maintain long-term access to compromised systems while evading detection mechanisms.

IOCs

XWorm SHA256

C4C533DDFCB014419CBD6293B94038EB5DE1854034B6B9C1A1345C4D97CDFABF

Scripts

4648ce5e4ce4b7562a7828eb81f830d33ab0484392306bc9d3559a42439c8558
9dd4902099e23c380596e7061482560866e103d2a899b84e0b6ff98c44c494e4
e73f48fe634a0c767bd596bbd068a13be7465993633fd61ccda717a474ee2db2

URL

hxxps://github[.]com/MockaPro/XX/raw/refs/heads/main/Microsoft.exe
hxxps://files.catbox[.]moe/3yb2zi.ps1

Recent News

Recent News