Firstsea
Static task
static1
Behavioral task
behavioral1
Sample
c4voo0gc.dll
Resource
win7-20220414-en
General
-
Target
c4voo0gc.rar
-
Size
576KB
-
MD5
84b7173353617c4c216397c3e68cb948
-
SHA1
ec64476b9242df713471a933849ac75593edd2a9
-
SHA256
4bbcbe529479c0526f33fa0e878b58abeb727debee1c924616a6e1f9a95980b9
-
SHA512
c69886872913e0ef7121ea0105362cf44352a3619d1aa55b0ef6225b3ba177ef09f3235bdca5e19072c040029bf276493b304a12acfadfd586a78d6231497eb0
-
SSDEEP
12288:fAEJhkFK62GbYs054M795+voCUxusp39b6nf/DhMsNNUu7AnT:fdJS2GN0aY5goao9b6nt9NtUnT
Malware Config
Signatures
Files
-
c4voo0gc.rar.dll windows x86
51b27f4568531763800428bfda4cfb55
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
GetWindowsDirectoryA
InitializeCriticalSection
Sleep
FindFirstFileA
EnterCriticalSection
FindClose
OpenMutexA
FindNextFileA
VirtualProtect
GetCurrentDirectoryA
TlsAlloc
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
VirtualAlloc
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
HeapSize
MultiByteToWideChar
GetLocaleInfoA
user32
UnhookWinEvent
SetWinEventHook
ole32
OleSetContainedObject
OleInitialize
OleUninitialize
oleacc
GetOleaccVersionInfo
AccessibleObjectFromWindow
GetStateTextA
AccessibleObjectFromEvent
Exports
Exports
Sections
.text Size: 484KB - Virtual size: 481KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ