Behavioral task
behavioral1
Sample
iTWr.exe
Resource
win7-20240704-en
General
-
Target
iTWr.exe
-
Size
75KB
-
MD5
775aca55730ffd2ac770cda4f047ed9c
-
SHA1
5fbef6eefe1e2ba7632002a470bec93b6fad89f3
-
SHA256
f69db7eebcf9bd3bb30dea0aa960502d2ec84db40fd64f7ba9b07d9e130d0b62
-
SHA512
71866ba12940431d4ac303b7ba8b8db3b00175eb4b78f4fd97ee5efbfaddfa3d4876d9ba9c3fbe32b63a0bf62e666d84337e7f0ebb4a0520344194a09981d4dc
-
SSDEEP
1536:NMIdbpliln5bFpDX3NBKRaEoBz15lqAaAFvBdybXT0En6VLUaOBxI:iIpplMnBLNfNBz1qALvmbXlIlOBu
Malware Config
Extracted
xworm
79.110.49.123:80
-
Install_directory
%AppData%
-
install_file
taskhost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource iTWr.exe
Files
-
iTWr.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ