Behavioral task
behavioral1
Sample
2240-34-0x0000000002EA0000-0x0000000002EBE000-memory.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2240-34-0x0000000002EA0000-0x0000000002EBE000-memory.dll
Resource
win10v2004-20231222-en
General
-
Target
2240-34-0x0000000002EA0000-0x0000000002EBE000-memory.dmp
-
Size
120KB
-
MD5
319d3cee8054edc8120633995379b212
-
SHA1
419b6778656d16ac41034132dc85c8d90fb0cc3c
-
SHA256
52dd65a98f1b22d8e9701db5ee2569a02bfe7c60da1555e6649ed17fcbfd0bdd
-
SHA512
73f301b55234ad25a98d48f4d4735941efb93d99f4380e9f5d8a04d82045fd07c4f6d0fea0d9256f5140c1b1b9fbd4aa949cd9c291b23f49a4b97958951e67e1
-
SSDEEP
1536:g7ulyi0HlkpuyRtmlBOBG7ek8wEu2b5pDv8yi99FUoaER8E:gMyi0HlkA+EBOB2e0T2b5pm99FRzqE
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2240-34-0x0000000002EA0000-0x0000000002EBE000-memory.dmp
Files
-
2240-34-0x0000000002EA0000-0x0000000002EBE000-memory.dmp.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ