Behavioral task
behavioral1
Sample
940-2-0x0000000000400000-0x000000000044A000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
940-2-0x0000000000400000-0x000000000044A000-memory.exe
Resource
win10v2004-20240508-en
General
-
Target
940-2-0x0000000000400000-0x000000000044A000-memory.dmp
-
Size
296KB
-
MD5
d21bbec252281d521a5fc0d9a1e8e7a5
-
SHA1
ae2bd8e9e4c11b1d8df442a3d97065ad9fac53e3
-
SHA256
441426e67e8268f67e423eee7f4f2fe972d18f562934d43d6ded89fc795f89a7
-
SHA512
97c2c48d509c44a8ca0eba69dfff59d48415caeb8f4282da06f185d1bfdedb5b084056c3aaf082cbf391a6895948343fb055de4de035c2b6608ebaa6ba6f7c97
-
SSDEEP
3072:UcqdvDlxdVkgauXKIIsWSiu1eWvjWu/8OJzehzmSO9jNXOqN+K3VJLlgUnMF2USj:UcqtD/knuZpl18OVSud13TO2gw0rU
Malware Config
Signatures
Files
-
940-2-0x0000000000400000-0x000000000044A000-memory.dmp.exe windows:4 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ