Behavioral task
behavioral1
Sample
2800-55-0x0000000000250000-0x00000000005F8000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2800-55-0x0000000000250000-0x00000000005F8000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2800-55-0x0000000000250000-0x00000000005F8000-memory.dmp
-
Size
3.7MB
-
MD5
935be565a4f4eb0f7d105b8354d82ba1
-
SHA1
36dacef43792341d21d391838aa1cf0156442224
-
SHA256
7e87d0809fc5f849bdd69758002c81a4a59ec862da0b9a6b10069ef2d32f58ef
-
SHA512
8596a8512a57af939a8ee3d7aff3e58650c53a98a69aa669a7fd42404cbaa7af56c93ecf7a892f397cc51b35598dd5176d14ecda7b3e8072babe0345a8bd1764
-
SSDEEP
49152:eiWv+iPJl3sdMTlIb5orL9dmoR9tWeCoqEm5OWuS+:eis+ix98oI66eC75fuS
Malware Config
Extracted
xworm
trial-pour.at.ply.gg:52808
-
install_file
USB.exe
Signatures
-
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2800-55-0x0000000000250000-0x00000000005F8000-memory.dmp
Files
-
2800-55-0x0000000000250000-0x00000000005F8000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 912KB - Virtual size: 912KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ