Behavioral task
behavioral1
Sample
e4b768a0a1970b4ed4786cc15376c39cab8b15ac34f9566f67a2baa45c5f382f.exe
Resource
win7-20240508-en
General
-
Target
e4b768a0a1970b4ed4786cc15376c39cab8b15ac34f9566f67a2baa45c5f382f.exe
-
Size
60KB
-
MD5
7b87dc448c231fda9f181ae2bbfa5d13
-
SHA1
23ce77011232f258710a47d7d6b427006cdd8967
-
SHA256
e4b768a0a1970b4ed4786cc15376c39cab8b15ac34f9566f67a2baa45c5f382f
-
SHA512
33f9770b160fbb6a612ae04e8ec394414fd5e0ce90c2db2b94ee4e6972efe097a330af2b219a426ef928d461e05e7be9701a267d689f77cf46f9badc3cde9593
-
SSDEEP
1536:eIsJ7lizY0Kkde5TN+br0gI4MOQETYw6:eIgAgN+brS4MOnTr6
Malware Config
Extracted
xworm
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/zNCj2Utm
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e4b768a0a1970b4ed4786cc15376c39cab8b15ac34f9566f67a2baa45c5f382f.exe
Files
-
e4b768a0a1970b4ed4786cc15376c39cab8b15ac34f9566f67a2baa45c5f382f.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ