Behavioral task
behavioral1
Sample
1708-2-0x0000000000D30000-0x00000000014DA000-memory.exe
Resource
win7-20240221-en
General
-
Target
1708-2-0x0000000000D30000-0x00000000014DA000-memory.dmp
-
Size
7.7MB
-
MD5
0c69c90ead627fe63347b8f16d7f8201
-
SHA1
499c479e1aab957c07f9c700adbbc19fd4d14a5f
-
SHA256
3fc4873d01efc60b0eba0f5be88ce13bf0a88e09bd2a004e1da31708503073ed
-
SHA512
4f8f4c6a98ab1c805fbde46906cad50f4d3945ae011f7647f91abf9a53afbc0c5d7c856eb07395fc55490485023aceeccce4d805ddb37dec68fbf0141e3a11d3
-
SSDEEP
196608:uzfhuFEK/mJV6pyr7KD+DQQ85XaqboLarqx:ou6iDMQ35Xr4
Malware Config
Signatures
Files
-
1708-2-0x0000000000D30000-0x00000000014DA000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 526KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 66KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 2KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 22KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ