Behavioral task
behavioral1
Sample
4020-3-0x0000000002C40000-0x0000000002C4E000-memory.exe
Resource
win7-20230831-en
General
-
Target
4020-3-0x0000000002C40000-0x0000000002C4E000-memory.dmp
-
Size
56KB
-
MD5
ab5422eea63a874101edef61cdf87e75
-
SHA1
30da8779df05e120fc26e973010a341ecd41f0e6
-
SHA256
2693747dc8e7fb8848ab8f60e2a8e82cd38d81369d6137f97a3c0aabc9693885
-
SHA512
026e579fe06d65d1e926cf1319635905ac6a89b3935a6195bf3b48959316c86b4839714a4ef0dad068c6ce5089c585b00967d5142c8e21732e761483b979839b
-
SSDEEP
384:jeAwIGmeffcbWICWv/0ILZGPcu0hYACSqRNxPo2uRugtFuBLTIOZw/WVnvn9IkVW:Becbl/b3uMYAoRNxQ2uBFE9RrOqhLbY
Malware Config
Extracted
xworm
3.1
159.69.11.30:7000
B9TuovWyb1qWEP8x
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4020-3-0x0000000002C40000-0x0000000002C4E000-memory.dmp
Files
-
4020-3-0x0000000002C40000-0x0000000002C4E000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ