Behavioral task
behavioral1
Sample
1520-118-0x0000000001360000-0x0000000001388000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1520-118-0x0000000001360000-0x0000000001388000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1520-118-0x0000000001360000-0x0000000001388000-memory.dmp
-
Size
160KB
-
MD5
aa1d6e8bae84ec0758800031178649ad
-
SHA1
24fc890c02ff5582679ffa7f93b519906ee622c3
-
SHA256
387fda07038d51438c358e3018acc38f9ad0bd578db1d7d306c94df8312b2e5d
-
SHA512
19e41bca738bc805785b133319b301cb7c1881f2266ab212b9d0415b63f17404153a968058dd6d2350abdc8284a0e74e264fb03d949d4746ce136524e7cdfea5
-
SSDEEP
3072:/FU9yyO9tBz65/M6If+3Js+3JFkKeTno:NU9UxBt25
Malware Config
Extracted
xworm
option-trading.at.ply.gg:19729
CvxI0GRq00C66HVd
-
install_file
USB.exe
Signatures
-
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1520-118-0x0000000001360000-0x0000000001388000-memory.dmp
Files
-
1520-118-0x0000000001360000-0x0000000001388000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ