Static task
static1
Behavioral task
behavioral1
Sample
c02c6b378c5512d91f972f51d4bb3e838cc8eb3871bbe1cc597f696e3b91e490.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c02c6b378c5512d91f972f51d4bb3e838cc8eb3871bbe1cc597f696e3b91e490.dll
Resource
win10v2004-20221111-en
General
-
Target
c02c6b378c5512d91f972f51d4bb3e838cc8eb3871bbe1cc597f696e3b91e490
-
Size
26KB
-
MD5
124ede4877c21e096ac4e5ba94914c26
-
SHA1
dbe45a876b4323dfdc84225e12731a366af889f5
-
SHA256
c02c6b378c5512d91f972f51d4bb3e838cc8eb3871bbe1cc597f696e3b91e490
-
SHA512
128a4596d33980e35567cd9aaba53d2b7ccda6854b30b685e0e02cebe6ad955043099bacc1fd1d60abde94270434c212ce5c21bab81a097bbfd2ff6052be85f2
-
SSDEEP
192:RdsftK+ud3vgsTKkRzYU7DhfqgJZ6NLLQVSZ09RRmu34VdzB:4Nu6smyMcVfqggLMVhPRm/
Malware Config
Signatures
Files
-
c02c6b378c5512d91f972f51d4bb3e838cc8eb3871bbe1cc597f696e3b91e490.dll windows x86
73ae99098d132e2f9404a32a328f3a67
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateMutexA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
LoadLibraryA
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
FindFirstFileA
VirtualProtectEx
GetProcAddress
GetModuleHandleA
CreateToolhelp32Snapshot
Module32First
ReadFile
GetModuleFileNameA
ReleaseMutex
WinExec
TerminateProcess
CreateThread
Sleep
GetCurrentProcess
Thread32Next
TerminateThread
GetThreadPriority
OpenThread
Thread32First
Process32First
lstrcmpiA
Process32Next
lstrlenA
CreateFileA
WriteFile
CloseHandle
GetTempPathA
GetSystemDirectoryA
Module32Next
user32
GetWindowThreadProcessId
EnumWindows
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shlwapi
StrStrIA
wininet
InternetCloseHandle
msvcrt
_itoa
??2@YAPAXI@Z
memcpy
strcmp
_purecall
strstr
strncat
strcat
strlen
memset
strcpy
sprintf
??3@YAXPAX@Z
Sections
.bss Size: - Virtual size: 9.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ