Behavioral task
behavioral1
Sample
svchost.exe
Resource
win11-20240419-en
General
-
Target
svchost.exe
-
Size
62KB
-
MD5
949f229078d60fe3862264f9275b7888
-
SHA1
5882bd15822ba4f2b67122459ac23d4a7bf38af8
-
SHA256
c13d9f4ccd9e4c95c416f55fa9a8a923b35f34ab8e269542bfc9aa5833a990da
-
SHA512
aca55359efdc9679d5277e738922ddf9443d6015a7989552eb14388cd13d47ddf42ed536190c5dc725a3a5b5651b21e5f0b02339e0e38c690d9edcc3e2e225c9
-
SSDEEP
1536:anBpklFiYq2d+Jyu4Qlc+bT65kKIIXGK6DdyOeZMJJwCJ5:o/k1qEC4F+bTnBIXhOeZMJ/5
Malware Config
Extracted
xworm
though-ever.gl.at.ply.gg:39233
127.0.0.1:39233
-
Install_directory
%Public%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource svchost.exe
Files
-
svchost.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ