Behavioral task
behavioral1
Sample
X4346Client.exe
Resource
win7-20240221-en
General
-
Target
X4346Client.exe
-
Size
324KB
-
MD5
69a723ed4cebb6e779ab62ab7bab37d3
-
SHA1
9e8f497fcf03dbd293c518557f6f503015c62276
-
SHA256
ff7efaae950c46e62c7c47a36c2678d1411acf80b92dec3be5c5fe53c6f74874
-
SHA512
084b89f8318a85642917982d661530ac7c67d45ed48725e52040d7ce204025f1099688985fb34e65844d4deda0db6e62b01f46cfe486f9587a231559e14210b8
-
SSDEEP
6144:Sjyrvh/bjV/5iZcBCqYg9HF0VRlQCvcL8qz00AGiULo+vRZ7qm+DJrOHMy:SjyxVB0g9l0VRlQD7zqGi0RZ1+DwHM
Malware Config
Extracted
xworm
primary-sections.gl.at.ply.gg:22675
-
Install_directory
%Temp%
-
install_file
dllhostPDF.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource X4346Client.exe
Files
-
X4346Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ