Behavioral task
behavioral1
Sample
1fea278ca3a9cec9148ddd053ed96f0217b5c69dddfe09797e89d2bf23d61a68.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1fea278ca3a9cec9148ddd053ed96f0217b5c69dddfe09797e89d2bf23d61a68.exe
Resource
win10v2004-20240709-en
General
-
Target
1fea278ca3a9cec9148ddd053ed96f0217b5c69dddfe09797e89d2bf23d61a68
-
Size
69KB
-
MD5
f503681758b9b206bbe44b45e9233b0c
-
SHA1
9db78ae4b6632aec5b5ec8b897c1fd1fddd3d25e
-
SHA256
1fea278ca3a9cec9148ddd053ed96f0217b5c69dddfe09797e89d2bf23d61a68
-
SHA512
3443e8cec6c550d21b0696ab7441ca47f17feafdaf25cb37004abd25513b295663b3c7c996bc19837e13ad16df43ddeb17a0f34e204eef13b9ae107db574707c
-
SSDEEP
1536:eOon1i3Sw4Molu+Lu182Azx8H+bSK9WMxy615GOKwXULQJ:5yh2E8H+bSK9Lh5GOrXHJ
Malware Config
Extracted
xworm
likely-necessity.gl.joinmc.link:25565
-
Install_directory
%Temp%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fea278ca3a9cec9148ddd053ed96f0217b5c69dddfe09797e89d2bf23d61a68
Files
-
1fea278ca3a9cec9148ddd053ed96f0217b5c69dddfe09797e89d2bf23d61a68.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ