Behavioral task
behavioral1
Sample
explorer.exe
Resource
win11-20240709-en
General
-
Target
explorer.exe
-
Size
155KB
-
MD5
88b527dc787b262c96104d6feada184d
-
SHA1
05ec13a0d1e26047f6bcb0c888bb27282fa4c7bb
-
SHA256
111eb153edfd244e4d0ab645288398e4f0fe983844a449fad80785bf019259e3
-
SHA512
8479a5852cfc7651d8bd5de32d27257d5a4396f3f27f08ed8efd49c573dad2a0c041d281bcdae5a5f36f3a4182601d452785f8403a0656241e8fee6a16b263b6
-
SSDEEP
3072:hmrJ+GDq1mb2pWtoTFOW2/JBsVlWN97u9bK6Sz0cAMSCboTiv:wxOUbETiBe9G6DMz
Malware Config
Extracted
xworm
https://pastebin.com/raw/ChxziS5b:112
-
Install_directory
%AppData%
-
install_file
\Roaming\Microsoft\Internet Explorer\UserData\iexpl.exe
-
pastebin_url
https://pastebin.com/raw/ChxziS5b
-
telegram
https://api.telegram.org/bot6809718735:AAE4t3xfzBHvyjC4zipUDbw1pc62fwQYOgs/sendMessage?chat_id=6601299789
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource explorer.exe
Files
-
explorer.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ