Behavioral task
behavioral1
Sample
63cb7e4047d811d0521ab05462b8776b888a0ce0937eea93b3607872a840d0e6.exe
Resource
win7-20240704-en
General
-
Target
63cb7e4047d811d0521ab05462b8776b888a0ce0937eea93b3607872a840d0e6
-
Size
37KB
-
MD5
41ea8ae229fbbbe8d0df087375fbe226
-
SHA1
a28c41e7ec5cb4ca6e083ae2de100f77f481acae
-
SHA256
63cb7e4047d811d0521ab05462b8776b888a0ce0937eea93b3607872a840d0e6
-
SHA512
4855cf7adda862c404fa97f8d8099fcd5cd9abfe0f661ef92650f072112d335a964066582c3d1b14f65d39aa6f88323e1c9172e887676a092ae7f7c81d8be0ae
-
SSDEEP
768:tz5lT+Q2PeKmxzoAXFyK9OiB6YOjh/PygJ:tz512PGsuF397B6YOjdP
Malware Config
Extracted
xworm
5.0
mode-clusters.gl.at.ply.gg:36304
ROvDsApv1F0V5Amc
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63cb7e4047d811d0521ab05462b8776b888a0ce0937eea93b3607872a840d0e6
Files
-
63cb7e4047d811d0521ab05462b8776b888a0ce0937eea93b3607872a840d0e6.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ