Behavioral task
behavioral1
Sample
1672-37-0x00000000000C0000-0x00000000000CE000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1672-37-0x00000000000C0000-0x00000000000CE000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
1672-37-0x00000000000C0000-0x00000000000CE000-memory.dmp
-
Size
56KB
-
MD5
45eddcbfb31479cd80b9cf79d38bc333
-
SHA1
7c181946ff7745e992bbec758af95efdbd286f2b
-
SHA256
20c1ab59d77b08f8c93793550a700196ac648ef7dc047dac7ec711b5a2ec460a
-
SHA512
1eb04252e20e7ec65644c5eefd0a5d5f91b28ac293d60c2c3380df954181aee637a4e75f39109e31bcfd6bd9d851e027f77ce1065d6b00c1678a840eaadb6bd2
-
SSDEEP
768:j11/wJ4aBcBoxVJt76RRVFr9jhOjhybe:51qCA97aDFr9jhOjoC
Malware Config
Extracted
xworm
5.0
primary.fastly-dns.com:54984
kbk.con-ip.com:54984
UvbWPurmSYHI9fDh
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1672-37-0x00000000000C0000-0x00000000000CE000-memory.dmp
Files
-
1672-37-0x00000000000C0000-0x00000000000CE000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ