Behavioral task
behavioral1
Sample
c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3.exe
Resource
win7-20240903-en
General
-
Target
c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3
-
Size
236KB
-
MD5
32ceabb96383dd10e7e1b81b5a7172d5
-
SHA1
4b77984d871887252ae8a4c698fbbbd8e6af6fd0
-
SHA256
c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3
-
SHA512
784e9c3a85263c3720f2e7dde1cf66f9761c9b11c3e664b52425019bdf799f504034991a3a90730b69db3e9bb9c1f62459b259792823400a7223b7ffc9c3d184
-
SSDEEP
3072:2IBL0F2988OjrLLAsNeDF5nI0PGIj9lua/Obw0hFv2PCWpIdp:2IBLu29QL0sNOBTunbw0/5Wp
Malware Config
Extracted
xworm
5.0
22.ip.gl.ply.gg:25132
RymNaZySkzhWjMqs
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3
Files
-
c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ