Behavioral task
behavioral1
Sample
1660-61-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1660-61-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1660-61-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
MD5
307cca0ac26366b2a2eefabdad9d5843
-
SHA1
0822273bc1109598ee8ff468da674339b7e0a190
-
SHA256
9dab275e1d2df7bdf4f92970d6ef4296b35f3dcf8292ebd45e5f9b9c004a1145
-
SHA512
cf764b40c9519c70155eeb7492a307aa291317b321de50295be6773c3b4d961fadefe494c6d3dcfb9cd7a97da61f083b36be94eb730c35114865b1895d1e06d3
-
SSDEEP
3072:QGybM97hOQ/iK2jrOyipV/XbKjvN18lOlJBcJOv4byXIgOj7Z94ZE:BDthOzj8VzKmewdbyIi
Malware Config
Signatures
-
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1660-61-0x0000000000400000-0x0000000000482000-memory.dmp
Files
-
1660-61-0x0000000000400000-0x0000000000482000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 426KB - Virtual size: 426KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ