Behavioral task
behavioral1
Sample
test.exe
Resource
win11-20240214-en
General
-
Target
test.exe
-
Size
70KB
-
MD5
281dd618c749909ed4dce57983b991ab
-
SHA1
d9e39b663e1bbae1a373de25a86833d8e929a9ac
-
SHA256
d66f9db88fc2744680c887395c15af83492dd58e9641c57b57b69d9757c45694
-
SHA512
74d6c74c1a9c6ca192e621bbde81c7e05c523e60a20954f2a4f21d0da7a88e0f488cc46d76d4303e6a91f0bce42f2a65ee10e99b341a40a48349d06e3045062c
-
SSDEEP
1536:q0/AbM4HUa5//XioBjvQoVpF8bZqR9ZDsxQ6gu8IOi3VA9Dn:vI5FNG68bZqRDtVIOsVANn
Malware Config
Extracted
xworm
127.0.0.1:6969
192.168.68.64:6969
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource test.exe
Files
-
test.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ