Behavioral task
behavioral1
Sample
ExpensiveClient.exe
Resource
win10v2004-20230703-en
General
-
Target
ExpensiveClient.exe
-
Size
337KB
-
MD5
9716e1b4c339bd810f54866d72d7a46d
-
SHA1
b30056b9b5d29c43a0f4d68bd50e9457556c4d75
-
SHA256
c620f392b223e451f9fa31f34a0c31eb7f79735989987a0b7488ec8c695eb39e
-
SHA512
c851e16e5d08e0cd64fc659ec21f2faad2711b128fd0a2b97348b139152d11cb2068831e4a53f8627f9ac1bbcce608fc0dc735954a50005a6faba27edc5d2658
-
SSDEEP
6144:WxFyLp/bYSVnSADRRRNKW1N1up5NNkasnRdBCQojzn9pzq9NiNkNNDLiXopqbCF1:WgtVWXdC
Malware Config
Extracted
xworm
releases-connection.at.ply.gg:34272
-
install_file
USB.exe
Signatures
-
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ExpensiveClient.exe
Files
-
ExpensiveClient.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ