Behavioral task
behavioral1
Sample
1332-55-0x000007FEF61C0000-0x000007FEF66F2000-memory.dll
Resource
win7-20230621-en
General
-
Target
1332-55-0x000007FEF61C0000-0x000007FEF66F2000-memory.dmp
-
Size
5.2MB
-
MD5
568a4056b2be640984ab8e3693b8605f
-
SHA1
619143881538ae925d4b3bbd36cada5581b4c8af
-
SHA256
7b13d5cea1797ed426be734ac146c7d07eccc743ab41ee2be7134f73a6905836
-
SHA512
8d908573d5863f0993e627cdf571b79e8df62d5dba32ee3352651fa4bab1ccde294f759cac0d6052818ea89e3deb422e06797f336f346d6cde54235ec50e2123
-
SSDEEP
98304:WjpVT7uv9amcCivg0pPb+/I+nuGBQ1ruWBW:WjruvoCiBpPK/DuUWBW
Malware Config
Extracted
systembc
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
Systembc family
-
Processes:
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1332-55-0x000007FEF61C0000-0x000007FEF66F2000-memory.dmp
Files
-
1332-55-0x000007FEF61C0000-0x000007FEF66F2000-memory.dmp.dll windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 595B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ