Behavioral task
behavioral1
Sample
3012-954-0x0000000000400000-0x0000000000406000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3012-954-0x0000000000400000-0x0000000000406000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
3012-954-0x0000000000400000-0x0000000000406000-memory.dmp
-
Size
24KB
-
MD5
63ba7cf241299acc6fdf759ebe2e1188
-
SHA1
94133043305d2aa114f3825d7260edef6d2c76db
-
SHA256
23f692e6a66f14e7d98150e9d28d9634b9c08ed5e7921d9b7e872f56064888a7
-
SHA512
bdfd17b056ac1c46c7196861a013543f79878b84b5504df356b6b568592a7c8702f737d9d1c84e0a2b7c40dfcbfb6f2a7f5c88257219a05885b250c582a132cf
-
SSDEEP
192:F8fzqMmTL+f6eeAY82mNZRZ1eLP/x1fkNvvjQDko:F8GMmv+f6eX22RZ0LXTsNcko
Malware Config
Extracted
systembc
69.10.60.115:4018
Signatures
-
Systembc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3012-954-0x0000000000400000-0x0000000000406000-memory.dmp
Files
-
3012-954-0x0000000000400000-0x0000000000406000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 278B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ