Behavioral task
behavioral1
Sample
d29f332c6b049cd51cef8b50e0174f1e9e8aa0a50858558490a64bbd23291a56.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d29f332c6b049cd51cef8b50e0174f1e9e8aa0a50858558490a64bbd23291a56.exe
Resource
win10v2004-20240802-en
General
-
Target
e29081b6a3a9204379abd03cb3c8b622.bin
-
Size
17KB
-
MD5
84bd1d08af9ff74272c2d41c5e02cef4
-
SHA1
7e91dcbf3cd7c502515de4c430fce24f9284a298
-
SHA256
f9f8544c1f34cf980759ceb42673ab9e16573df8d6b020a7a4f885cab598c230
-
SHA512
7ddeccc0a3a3f384d44945f0ba3980d4f9816703a518a6438f7cfa434ec9550e6932c0a2c4f76dc925aba6c87fd309e88fd1ad03625d9e8bef881c831d2ceb42
-
SSDEEP
384:GebwGEvzYVqNePswaAiXRz7ROheHLRWdGFUZLcdxejmWQlS55I:pwZkqNeURAilRy/L2v9WQlSI
Malware Config
Extracted
xworm
5.0
september-am.gl.at.ply.gg:11177
JPzcSNhtsupKGcTv
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/d29f332c6b049cd51cef8b50e0174f1e9e8aa0a50858558490a64bbd23291a56.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d29f332c6b049cd51cef8b50e0174f1e9e8aa0a50858558490a64bbd23291a56.exe
Files
-
e29081b6a3a9204379abd03cb3c8b622.bin.zip
Password: infected
-
d29f332c6b049cd51cef8b50e0174f1e9e8aa0a50858558490a64bbd23291a56.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ