Behavioral task
behavioral1
Sample
2592-68-0x0000000000C70000-0x000000000147E000-memory.exe
Resource
win7-20230712-en
General
-
Target
2592-68-0x0000000000C70000-0x000000000147E000-memory.dmp
-
Size
8.1MB
-
MD5
027d6d520d80ad0e6d8bf6470c94547e
-
SHA1
70ad3854c2801afbc748269fb3acfbc43627e54a
-
SHA256
224539566b3e556d047d3ed3aed5f3476f3987678f7acfc2ebba11bb96afe03f
-
SHA512
6c7dd66c765d61c399f25a103baebc80ef52bcb5dec63b9e2b6e4e66047ae671cc1e7607df33603c27075700cb61cdf111b9fdeff30cacde176792685234e475
-
SSDEEP
98304:ILKR8dvrSwWZzAe2IZCnN3A0q7ww1zij7uPYpsWsV3rSJ9qIP7GYHNqmfU:emKIZMwN1xw1g3W39DGYHNPU
Malware Config
Extracted
xworm
stores-anytime.at.ply.gg:36673
14hyqdgIYznSdTk2
-
install_file
USB.exe
Signatures
Files
-
2592-68-0x0000000000C70000-0x000000000147E000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ