Behavioral task
behavioral1
Sample
2812-68-0x0000000000400000-0x0000000000489000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2812-68-0x0000000000400000-0x0000000000489000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2812-68-0x0000000000400000-0x0000000000489000-memory.dmp
-
Size
548KB
-
MD5
f8b76817c4a6eb37d219f3b05f5d7ada
-
SHA1
af636f7aa82a4a082d00f4f559ca91a2fb237073
-
SHA256
676def2423db7600d10423036c99a358b576f91bacb65ea7bfb2a0f99a1e55cc
-
SHA512
abb1566526ee33363937c892fe92b8abe7ea227426c0809737b2cd47143da95226ffcd72b15e58a4d6d48d14d56dcda169365f426473b94764b39a38a980443a
-
SSDEEP
12288:1tRXxReZj3WZfj/2eSseWFaIe2+f8CL4hs/ZfL:1tx7cyF2eSsewS8W4gZT
Malware Config
Signatures
Files
-
2812-68-0x0000000000400000-0x0000000000489000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 308KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 213KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE