Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Dropper.Win32.Dycler.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Trojan-Dropper.Win32.Dycler.exe
Resource
win10v2004-20230220-en
General
-
Target
Trojan-Dropper.Win32.Dycler.ypp-177782be48ed39b66a70c51f592f0b3ac31a8aefe5f809eb45ee9d8bb18c2946
-
Size
116KB
-
MD5
e4d7596676b884563d9af2eef3642b1f
-
SHA1
f56bd539b687e7fb4d8ee7467ad47dfd8cd1e3f6
-
SHA256
177782be48ed39b66a70c51f592f0b3ac31a8aefe5f809eb45ee9d8bb18c2946
-
SHA512
e919f2e3ba788ea4faf9e8dba3d027540f6909c007b6a66f7dc7c6484a092222d3f07fe2029f7e288acce68b782e5363033ca676b9800e9f8056150fd78574d6
-
SSDEEP
1536:RzLwITdxbvBRUcN6sWjcd4o7CR5NSJBfv+y91vWb7pWK6cSlIVYrNwPK:RgITPjB9l4o7ILSTWM1v+dRVYrNwC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Trojan-Dropper.Win32.Dycler.ypp-177782be48ed39b66a70c51f592f0b3ac31a8aefe5f809eb45ee9d8bb18c2946
Files
-
Trojan-Dropper.Win32.Dycler.ypp-177782be48ed39b66a70c51f592f0b3ac31a8aefe5f809eb45ee9d8bb18c2946.exe windows x86
8294ad0cc96806cc3d51ead1477959f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleOutputCP
RtlMoveMemory
FindFirstFileA
GetHandleInformation
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
IsValidCodePage
EnterCriticalSection
SearchPathA
FindClose
LoadLibraryA
OpenMutexA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
GetFileType
CreateFileMappingW
SetConsoleCtrlHandler
WaitForMultipleObjects
SetEnvironmentVariableA
GetModuleFileNameA
GetOEMCP
lstrcmpiW
DebugSetProcessKillOnExit
GetModuleHandleA
EraseTape
CreateMutexA
IsDebuggerPresent
QueryPerformanceFrequency
DeleteCriticalSection
LocalSize
CloseHandle
WriteFileEx
DeleteFileW
GetCurrentProcessId
GetFileInformationByHandle
LocalFree
GlobalReAlloc
GetSystemTime
LCMapStringW
LCMapStringA
SetStdHandle
GetConsoleCP
FlushFileBuffers
HeapSize
GetStringTypeW
HeapAlloc
RtlUnwind
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
GetCPInfo
LeaveCriticalSection
TlsFree
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
WriteFile
GetStdHandle
GetModuleHandleExW
DecodePointer
EncodePointer
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
IsProcessorFeaturePresent
GetCommandLineA
RaiseException
SetFilePointerEx
MultiByteToWideChar
GetACP
CompareStringW
GetEnvironmentVariableA
CreateFileW
ReadFile
FileTimeToSystemTime
TerminateProcess
WriteConsoleW
LocalReAlloc
GetFileAttributesW
HeapDestroy
FormatMessageW
SizeofResource
Sleep
GetLocaleInfoW
TerminateThread
GetConsoleMode
IsValidLocale
WideCharToMultiByte
TlsSetValue
GetDateFormatA
GetProcessHeap
VirtualFree
GetTickCount
GetModuleHandleW
WaitForSingleObject
GetProfileStringW
HeapFree
GlobalSize
GetCurrentActCtx
GetCurrentProcess
LoadResource
FreeLibrary
SetEndOfFile
lstrcpynA
GetLocaleInfoA
FindFirstFileW
FindResourceA
GetFileSize
HeapReAlloc
GetDateFormatW
GetComputerNameA
GetCommandLineW
ExitProcess
user32
GetWindowThreadProcessId
GetDialogBaseUnits
GetProcessDefaultLayout
TrackPopupMenu
LoadImageW
SetCapture
IsZoomed
DrawTextA
GetSubMenu
SetMenuItemBitmaps
SetForegroundWindow
LoadStringA
DeleteMenu
MoveWindow
DialogBoxParamW
LoadBitmapA
IsClipboardFormatAvailable
AttachThreadInput
InvalidateRgn
MessageBeep
FindWindowW
UnhookWinEvent
DrawTextExW
SetFocus
GetMenuCheckMarkDimensions
wsprintfW
LoadAcceleratorsW
GetMenu
SendDlgItemMessageA
PostQuitMessage
CreateDialogParamA
SetActiveWindow
GetMessageA
ScreenToClient
GetFocus
IsDialogMessageW
GetWindowPlacement
OffsetRect
GetWindowTextA
SetWinEventHook
GetKeyboardLayout
TrackPopupMenuEx
MessageBoxA
SetCursorPos
LoadMenuW
GetWindowLongW
GetClipboardData
TranslateAcceleratorA
GetMenuState
CharUpperW
DefWindowProcA
SendDlgItemMessageW
GetDesktopWindow
GetCursorPos
ShowWindow
SetMenu
GetSysColorBrush
AppendMenuA
OpenClipboard
SetProcessDefaultLayout
MessageBoxW
ReleaseCapture
GetSystemMetrics
SetWindowTextA
SendMessageW
UpdateWindow
EnableWindow
SetClipboardData
DestroyMenu
GetDlgItemTextA
GetForegroundWindow
gdi32
EndPage
GetTextExtentPoint32W
GetTextMetricsW
StartPage
GetDeviceCaps
StretchBlt
TextOutA
AbortDoc
ExtTextOutA
TextOutW
GetObjectA
StartDocW
StartDocA
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
DeleteObject
SetBkMode
CreateDCW
SetBkColor
SetAbortProc
winspool.drv
ClosePrinter
GetPrinterDriverW
OpenPrinterW
comdlg32
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleW
FindTextA
GetOpenFileNameW
ReplaceTextW
PrintDlgExW
advapi32
RegSetValueExW
AdjustTokenPrivileges
ControlService
FreeSid
AllocateAndInitializeSid
RegDeleteValueA
RegOpenKeyExA
LookupPrivilegeValueA
StartServiceA
RegCreateKeyA
InitializeSecurityDescriptor
RegSetValueExA
IsTextUnicode
RegCreateKeyW
OpenProcessToken
shell32
CommandLineToArgvW
DragFinish
DragAcceptFiles
ShellExecuteExA
Shell_NotifyIconA
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ