Behavioral task
behavioral1
Sample
1776-17-0x0000000000400000-0x0000000000410000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1776-17-0x0000000000400000-0x0000000000410000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1776-17-0x0000000000400000-0x0000000000410000-memory.dmp
-
Size
64KB
-
MD5
d2f4f9300fe3985863973d320c7ad517
-
SHA1
691d111e70fcf319c7e5d833e71abf12a56357fb
-
SHA256
4642a19868425bc6e8bba3db3a06e61a07c80c90213fec2eeeb7dee69dc5044a
-
SHA512
175759bc595c3d25b4f768a4799bbb665fb34bcaa44e9c13a81e9b8719ae2611ef29b054ea14b599fb64ca00e256043e8ccf13c79c9317519d44b33abce584fc
-
SSDEEP
768:pUw9W9heo4QMRpE17O59DGObNLFf9dP4OuhKyr3WW:f89heTK1infRFf9dP4Ou8I
Malware Config
Extracted
xworm
3.1
191.101.130.18:8252
9DiMa559vRsnPK3A
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1776-17-0x0000000000400000-0x0000000000410000-memory.dmp
Files
-
1776-17-0x0000000000400000-0x0000000000410000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ