Behavioral task
behavioral1
Sample
svchost.exe
Resource
win11-20231215-en
General
-
Target
svchost.exe
-
Size
38KB
-
MD5
2755d39f8199aa4f42d48fba5f56d276
-
SHA1
7edd88d5eb16b6bb3f8313d49cd54a720d2c4a7b
-
SHA256
d2aa2b52db1fe8374a0464521f367628db2d125d2a5f7fa8fc788f329816b700
-
SHA512
9d0a7779a575778675a54d912d2f7c5ea25b26670e68a9285ced5d02422f640038ea4c9e1725b992abae05a6a2cfc56704dcf66107a13c17636c03748aeeceb3
-
SSDEEP
768:ScyUd+KOXunfc5NiJl0W7FWPA9xAOMhnjX:ScUKkUxa+FR9xAOMh7
Malware Config
Extracted
xworm
5.0
mode-apollo.gl.at.ply.gg:59320
VT07NpSibktpO6CI
-
Install_directory
%Temp%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource svchost.exe
Files
-
svchost.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ