Static task
static1
Behavioral task
behavioral1
Sample
c0c3a50d40464e9045706859ef51607cc18b79e2401e395a55925c502b1cc6bb.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0c3a50d40464e9045706859ef51607cc18b79e2401e395a55925c502b1cc6bb.dll
Resource
win10v2004-20220812-en
General
-
Target
c0c3a50d40464e9045706859ef51607cc18b79e2401e395a55925c502b1cc6bb
-
Size
23KB
-
MD5
90489388c49d9dd712284eef3e69c7b3
-
SHA1
6d54ba702ccd3fa7b3f606fb3321c42430cd1ad8
-
SHA256
c0c3a50d40464e9045706859ef51607cc18b79e2401e395a55925c502b1cc6bb
-
SHA512
573a4a6e220710330829b7cfb4bca3628edc3fd9b51683c5b69fea46b831b2109f24470de9f7e8a0b79bc2732dbed170f6ba3e503f396e2cdf59d7a2d2044364
-
SSDEEP
384:PbaXK2NBB5+zIIZ/1+RXGFR+yXnmG8fRWBKzl52728VfQNBxahnZPNfgih8:PbaxBBdsQRXYlXmGuWBKzQVfQNvynVNw
Malware Config
Signatures
Files
-
c0c3a50d40464e9045706859ef51607cc18b79e2401e395a55925c502b1cc6bb.dll windows x86
6941eb0c9fa87312c0c483a4f3b23e90
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtectEx
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
ReadProcessMemory
SetThreadContext
GetCurrentThread
SetUnhandledExceptionFilter
Process32Next
Process32First
InitializeCriticalSection
GetModuleFileNameA
GetCurrentProcess
WriteProcessMemory
IsBadReadPtr
CloseHandle
TerminateThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CreateThread
GetCurrentProcessId
OpenMutexA
CreateMutexA
RaiseException
Sleep
CreateToolhelp32Snapshot
user32
FindWindowA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowTextA
GetWindowThreadProcessId
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
strstr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strrchr
wcslen
memset
strcat
sprintf
strcpy
memcpy
strncpy
strchr
??2@YAPAXI@Z
strlen
??3@YAXPAX@Z
sscanf
_strlwr
fclose
fread
fopen
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ