Behavioral task
behavioral1
Sample
1036-43-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1036-43-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
1036-43-0x0000000000400000-0x000000000040E000-memory.dmp
-
Size
56KB
-
MD5
cdfa5ca52118f161c9e44a93c4b6dc68
-
SHA1
742e6625cdc5df32d4eb26073d8864839739c375
-
SHA256
25aae9923df17a2fbec1082d9c9c1cdb26cbe526d8957d9de1ddaf4faf260a3f
-
SHA512
954e047dab9e15b67a977c13fd789ca082fb1598df5c285b3b5bd7550dcc45b836fb3246fd83771acdc2a74ccf9825f2c9ff4aa3927881f733ad0ed48e5e418b
-
SSDEEP
768:SUa+vNshO8q8WoxVJt76JRVFr9jxOjhWbC:5vN4dR97SDFr9jxOj8+
Malware Config
Extracted
xworm
5.0
httpss.ddns.net:99
qinaw9YeuAb7oGHf
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1036-43-0x0000000000400000-0x000000000040E000-memory.dmp
Files
-
1036-43-0x0000000000400000-0x000000000040E000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ