Behavioral task
behavioral1
Sample
3016-10-0x0000000000EA0000-0x0000000000EF6000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3016-10-0x0000000000EA0000-0x0000000000EF6000-memory.exe
Resource
win10v2004-20240709-en
General
-
Target
3016-10-0x0000000000EA0000-0x0000000000EF6000-memory.dmp
-
Size
344KB
-
MD5
1aafcc19fc7ce8dcec6824739f08515c
-
SHA1
8ad16ad1f8c8294be1e569d631ef777e4dbfce05
-
SHA256
1c669b3733834cf929f0cbc7aeab5ca93ea4521bb0ac06ecb6e6c31d669edde5
-
SHA512
0e0e4d8a6f24f327bd4098d236c4d344a91cb49015b03dc9c51824ff6fb79c12d0efdcbad62b813c281faa7195cbbf623efe91b31c8eb112f1e6b35e62665f37
-
SSDEEP
3072:uKShuWbilT4O9sbyOkitG/iJpXnc858j:uKCRboOkiYcRnh
Malware Config
Extracted
xworm
she-vocal.gl.at.ply.gg:36704
-
Install_directory
%AppData%
-
install_file
notepad.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3016-10-0x0000000000EA0000-0x0000000000EF6000-memory.dmp
Files
-
3016-10-0x0000000000EA0000-0x0000000000EF6000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ