_FMODGetDSPDescriptionEx@0
Behavioral task
behavioral1
Sample
a2b236fe59c2e4cd2678b2b6f63936832722b7c900ccb21de963ff1ede489605.dll
Resource
win7-20221111-en
General
-
Target
a2b236fe59c2e4cd2678b2b6f63936832722b7c900ccb21de963ff1ede489605
-
Size
117KB
-
MD5
22e47b34081dab08c39c8a0821178ff0
-
SHA1
238cd216b254c88ebbdf13d4eec4df03a0811cbb
-
SHA256
a2b236fe59c2e4cd2678b2b6f63936832722b7c900ccb21de963ff1ede489605
-
SHA512
8ef618b53593335c52192d55c60e01e374f7e2c3d5cc768b016fd6c22ffb2b32b043c58c831fedc07057bb8b6489a2f490edcd4019ac66203665460a6b9c70bd
-
SSDEEP
3072:LkwWn/w65Oh6uBUYZUJyts29x4G+VC5m:LkfIBfUJy5xLaCs
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a2b236fe59c2e4cd2678b2b6f63936832722b7c900ccb21de963ff1ede489605.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 113KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 406B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ