Behavioral task
behavioral1
Sample
444.exe
Resource
win7-20240903-en
General
-
Target
444.exe
-
Size
139KB
-
MD5
0a413a440eff4c1e27ef44959083602e
-
SHA1
8a75879ec82b57f53a021c36eeed92c33895c8d6
-
SHA256
38ea988bebe32440267da50e02bbc3870e4cdf22c1c7e2b4047fff060d8581b1
-
SHA512
866e7413356ea21895b7185795978eeee198e30af7ca2acba8a5060e20a5301678e5ee64c3bd8797797e76bd43c5854cc3c88b67dd6df5b3d2891b3a0d0d97d0
-
SSDEEP
1536:LyCNv9hCwERbiKuumnaFe92j6cOMbtEI:LJyTFe92JOMhEI
Malware Config
Extracted
xworm
5.0
18.ip.gl.ply.gg:43573
FebSxdI6yHyp3mp7
-
Install_directory
%AppData%
-
install_file
COM Surrogate.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 444.exe
Files
-
444.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ