Behavioral task
behavioral1
Sample
Defender.exe
Resource
win11-20240709-en
General
-
Target
Defender.exe
-
Size
36KB
-
MD5
fed1dab590c168feb616813a7ac20c8f
-
SHA1
ffa660b1d0f8d7f1d4b9b30e415c420b13eccd6c
-
SHA256
5fd21480e11193b051e36cc259c226313d68bdf0b688b9ec0aacd9a36500c660
-
SHA512
e9af3050325c494bbe32bbb6e6acb784bf3af1031edaaeb8f8998e17c43b71ed320de391f7dcfbdf20da4255cc4092e0d1547b92cfeba12844291ab27c016c81
-
SSDEEP
768:oLAz8nG6Hu51L8Cjuw9FALFyn9C3OjhYD2h:osSG6cj5aFU9C3Oj1
Malware Config
Extracted
xworm
5.0
making-oil.gl.at.ply.gg:27076
g0NPVjtEQldQRbKS
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Defender.exe
Files
-
Defender.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ