Behavioral task
behavioral1
Sample
4860-1538-0x00000000004D0000-0x00000000004E2000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4860-1538-0x00000000004D0000-0x00000000004E2000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
4860-1538-0x00000000004D0000-0x00000000004E2000-memory.dmp
-
Size
72KB
-
MD5
bca8b1ec8e2d6cd3c0bfa3de6f170d5a
-
SHA1
3d2cefda39b3b6e26dbe9815a8c7f26330bd6f4c
-
SHA256
a5b8ae377f4018c226feaef78a168bcf0e903fa82518d83d146fc3525019c88d
-
SHA512
dde8cc11243302474d0a7a09e0ff17ed0d22a35d89ae78ab2be7185af7aee0c8bfeefa9e9edece4bd52f68292c190afb5317488ed92fd40650a6fede9a2c3b12
-
SSDEEP
768:W7qTiQDkup+Ab5O+ui93yXSeH6wSmvxra2R2XSN+F0v91662OohrGTCh:WvU5O+uikH9SSxra5Fi91662OoYG
Malware Config
Extracted
xworm
5.0
xp8AtPT05Geksh1H
-
Install_directory
%ProgramData%
-
install_file
MicrosoftService.exe
-
telegram
https://api.telegram.org/bot7115811442:AAHiWQv7RdFsbXnJS5hfG6P1vphsJnlPSV4/sendMessage?chat_id=971347293
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4860-1538-0x00000000004D0000-0x00000000004E2000-memory.dmp
Files
-
4860-1538-0x00000000004D0000-0x00000000004E2000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ