Behavioral task
behavioral1
Sample
1248920x00000000004000000x00000000007E4000memory_JC.exe
Resource
win7-20230831-en
General
-
Target
1248920x00000000004000000x00000000007E4000memory_JC.dmp
-
Size
3.9MB
-
MD5
c4d9517b248f99b44821fb6d7e0c3722
-
SHA1
589ccb1e23fc1d09d66e7d8e7520c390cfba4f53
-
SHA256
9ae0c25679713aaea8ec01e6ebae61fd8225dedade07f45e1fc162072ba8df99
-
SHA512
a5ed0be6f5e28804f2ab5bd6b51ee3e6d5a8586dee05431ee099bae299e49a1ef0da0badc34f466a5d4942ffeef07d6080560eee5b4873afa63478fa036c0421
-
SSDEEP
49152:KCRB7xHqLoupIlPf9SXDFBU2iIBb0xY/6sUYYl:R7xHiQyXbFZCBv
Malware Config
Signatures
Files
-
1248920x00000000004000000x00000000007E4000memory_JC.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE