Static task
static1
Behavioral task
behavioral1
Sample
1056-54-0x0000000000400000-0x000000000043D000-memory.exe
Resource
win7-20220414-en
General
-
Target
1056-54-0x0000000000400000-0x000000000043D000-memory.dmp
-
Size
244KB
-
MD5
e7a3dcb01995438e1309430df53196f0
-
SHA1
19606aed7e42e667040843721603bd7014c9802a
-
SHA256
b835dbd85346b17b746672a1fcc78ef738592e1de19b9ceb7c0349c9bf2644fb
-
SHA512
caec54b9c6bcea19f2314dab878bbf447d3f463cfe4acdc2f95670031fae63068031106b2bd3374b685119ee2a8076be192501d165559052c8c3265090762751
-
SSDEEP
1536:UYz/E8hW9NdYAygNlvhIoOl9SAKD7PNch1ZmmImh1ADN8blGe5SagvHLNaV81J3n:Um/E8k9ZjpIL+zNch12KbAwSaS9JSp8
Malware Config
Signatures
-
Arkei family
Files
-
1056-54-0x0000000000400000-0x000000000043D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 114KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 864B
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE