Behavioral task
behavioral1
Sample
2944-11-0x0000000000400000-0x0000000000418000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2944-11-0x0000000000400000-0x0000000000418000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2944-11-0x0000000000400000-0x0000000000418000-memory.dmp
-
Size
96KB
-
MD5
38970eef58772f4af83bdb6eea116701
-
SHA1
4c6d674d043e7e04c4d86e81e79cf8cd15822cd0
-
SHA256
50ec8752787c0a2dc683488b493f19fd8311c338dc192d12ce235b09ff615c13
-
SHA512
3c5cc5048f161357a65fd600897fead46b21c9dc6a5490b20a63fafaef8f7743603da87ff4c892dade3be516b4b0e4b9c708038fbf566ed46eb5ae871165fee4
-
SSDEEP
1536:YbofpY8FRxbp+Eab0/qTZAEBMOrhgIPVK68b8lk19YV67eO4PnJFBF:sUvxb2ImAEUIPN8b8k9YLO4PTn
Malware Config
Extracted
xworm
notes-ease.gl.at.ply.gg:22444
-
install_file
Windows.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2944-11-0x0000000000400000-0x0000000000418000-memory.dmp
Files
-
2944-11-0x0000000000400000-0x0000000000418000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ