Behavioral task
behavioral1
Sample
b3f7ef12e5850be08fae03f2dbcdeafe60eecda7dcacad6d063316d9bb60054bN.exe
Resource
win7-20240903-en
General
-
Target
b3f7ef12e5850be08fae03f2dbcdeafe60eecda7dcacad6d063316d9bb60054bN.exe
-
Size
41KB
-
MD5
5897a8d4af213231c600c4ec39aac260
-
SHA1
c629ca2abba0cdd1e8429787f82d7f0a997f92f6
-
SHA256
b3f7ef12e5850be08fae03f2dbcdeafe60eecda7dcacad6d063316d9bb60054b
-
SHA512
05ab38ebd256a048df1fa86677a236cb305879eec28a15a4c7ae3789a63db12bd98dd457f313f9c58d13ab5f5d66e63932c0e60b4c01dda1ddc8a20caf233016
-
SSDEEP
768:CG2ZOWZ42nxuT6XvgggrLJF5PG9pms16vOwhS3EizV:CG2bZ42n0eXvvghFI9Ae6vOwgFh
Malware Config
Extracted
xworm
5.0
bid-displaying.gl.at.ply.gg:51183
ZLggE2ghCuQzhJDy
-
Install_directory
%ProgramData%
-
install_file
Windows App Certification.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3f7ef12e5850be08fae03f2dbcdeafe60eecda7dcacad6d063316d9bb60054bN.exe
Files
-
b3f7ef12e5850be08fae03f2dbcdeafe60eecda7dcacad6d063316d9bb60054bN.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ