Behavioral task
behavioral1
Sample
4860-133-0x0000000010000000-0x000000001013B000-memory.dll
Resource
win7-20221111-en
General
-
Target
4860-133-0x0000000010000000-0x000000001013B000-memory.dmp
-
Size
1.2MB
-
MD5
e5c9a09b7a3b0bb82302db4ce902855d
-
SHA1
e9b0bc0a2fe4e790cd090f38ef2ebf237d1b82b3
-
SHA256
a5c9cf2ec9abeb644cbe33bcf1035f3efb1c5282cbd145abbd3c593eb8449a94
-
SHA512
ffb324318b08459a4b552466a2b12f0c21d7d20c4c10ab572c55b26674945e53f9d7086d5d73a5472004ca04cef10e3528bff431c8fc9ea2891d20c5664d1ca4
-
SSDEEP
24576:JZA5Md+xdHP0J6wfwnriXWYXbsdmTHdUHlRRrc5Pi7OQMCeMwVrGOUfp7O:J3SdY6OwriXWQsdmbdelRdkai4eMw5Gk
Malware Config
Signatures
-
Systembc family
Files
-
4860-133-0x0000000010000000-0x000000001013B000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pelock Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE