Behavioral task
behavioral1
Sample
12.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
12.exe
Resource
win10v2004-20240426-en
General
-
Target
12.exe
-
Size
60KB
-
MD5
912c5ade2dc17f825036e94fdd85b063
-
SHA1
7ac8e63df65e14b4d4d4beca2204418485fa3cfa
-
SHA256
b333067f0a6a6b025855c409b291cea8bf7bf8056ac31c1b64d04cc257f60dc6
-
SHA512
d3b2f6b3b111804ac5235180b1bd859140fa34e0ff47b7689d6ea719de017d98c8971adfc9efdcecbd688a12c22d358896538b4a54b9739cb95003da348fd9ed
-
SSDEEP
1536:5WkxdnRY2jXz0DjhzHIV2/O1dnR/kCNkbf5xFgnQNURUOLCiF:5W2dnRYYIDVa22LnR/TkbfPtOLhF
Malware Config
Extracted
xworm
t-screening.gl.at.ply.gg:11852
-
Install_directory
%Userprofile%
-
install_file
ww.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12.exe
Files
-
12.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ