Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win32.Reconyc.huvf-8ab65ceef6b8a5d2d0c0fb3ddbe1c1756b5c224bafc8065c161424d63937721c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Trojan.Win32.Reconyc.huvf-8ab65ceef6b8a5d2d0c0fb3ddbe1c1756b5c224bafc8065c161424d63937721c.exe
Resource
win10v2004-20230220-en
General
-
Target
Trojan.Win32.Reconyc.huvf-8ab65ceef6b8a5d2d0c0fb3ddbe1c1756b5c224bafc8065c161424d63937721c.exe
-
Size
113KB
-
MD5
3bceadd4c2c546aba24e24307f1defcd
-
SHA1
81e4110a72821a1b1f01a3f3a8bf89188af40067
-
SHA256
8ab65ceef6b8a5d2d0c0fb3ddbe1c1756b5c224bafc8065c161424d63937721c
-
SHA512
fbe80ee6902b76a533e8662e580cf887e7a6735752731a53a6189d7b8c1e1c7c881d817a137c3553ab1b6f40c673887d83460d35d01ad0ace18a89c7f5bea525
-
SSDEEP
1536:eEzTqjcZdskFrWcN9JsWjcdZB+TMKVu0CcqDuvn+FsN7S1bdQlBrr2DYLN:bzocZGgrh92ZYTMKEHD0nj21bd01N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Trojan.Win32.Reconyc.huvf-8ab65ceef6b8a5d2d0c0fb3ddbe1c1756b5c224bafc8065c161424d63937721c.exe
Files
-
Trojan.Win32.Reconyc.huvf-8ab65ceef6b8a5d2d0c0fb3ddbe1c1756b5c224bafc8065c161424d63937721c.exe.exe windows x86
e2fd2a95dfdf88cb95cece4ae812c4cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetTimeFormatW
MulDiv
WriteConsoleW
FileTimeToSystemTime
GetSystemDirectoryA
GetEnvironmentVariableA
CompareStringW
ExitThread
MultiByteToWideChar
GlobalUnlock
FlushFileBuffers
LCMapStringA
EnumSystemLocalesA
RtlMoveMemory
GetStartupInfoA
GetHandleInformation
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
QueueUserAPC
LocalLock
IsValidCodePage
SetStdHandle
SearchPathA
VirtualAllocEx
FindClose
LoadLibraryA
GetProcessId
CreateFileMappingA
CreateFileMappingW
GetOEMCP
GetModuleHandleA
CreateMutexA
FreeEnvironmentStringsW
WriteProfileStringW
GetCurrentDirectoryA
CompareStringA
QueryPerformanceFrequency
FatalAppExitA
TlsAlloc
CloseHandle
WriteFileEx
GetVersion
DeleteFileW
LeaveCriticalSection
LocalFree
GetSystemTime
TlsFree
ResumeThread
LCMapStringW
DeleteFileA
CreateThread
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
GetStringTypeW
HeapAlloc
RtlUnwind
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
GetCPInfo
GetACP
EnterCriticalSection
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
GetStartupInfoW
DeleteCriticalSection
GetFileType
GetProcessHeap
GetModuleFileNameW
GetStdHandle
GetModuleHandleExW
DecodePointer
EncodePointer
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
IsProcessorFeaturePresent
IsDebuggerPresent
CreateEventA
SizeofResource
Sleep
InitializeCriticalSectionAndSpinCount
CreateFileW
GetLocaleInfoW
IsValidLocale
GetVolumeInformationA
GlobalAlloc
GetEnvironmentStrings
TlsSetValue
GetCommandLineA
WriteFile
FormatMessageA
GetSystemTimeAsFileTime
VirtualFree
GetCurrentThread
GetModuleHandleW
SleepEx
GetUserDefaultLCID
GetProfileStringW
HeapFree
GlobalSize
GetCurrentProcess
LoadResource
FreeLibrary
FindResourceW
SetEndOfFile
lstrcpynA
UnmapViewOfFile
MapViewOfFile
GetStringTypeA
GetLocaleInfoA
TlsGetValue
FindFirstFileW
GlobalMemoryStatus
GetFileSize
CreateFileA
DosDateTimeToFileTime
HeapReAlloc
GetDateFormatW
LocalUnlock
GetComputerNameA
GetCurrentProcessId
ExitProcess
user32
PostQuitMessage
SendDlgItemMessageA
TrackPopupMenu
RegisterWindowMessageW
IsIconic
IsChild
SetCapture
KillTimer
GetFocus
LoadBitmapA
IsClipboardFormatAvailable
MessageBeep
FindWindowExA
FindWindowW
UnhookWinEvent
DrawTextExW
SetFocus
MoveWindow
GetWindow
DefWindowProcW
GetDialogBaseUnits
GetMenuCheckMarkDimensions
OpenDesktopA
GetDC
DrawFocusRect
IsDialogMessageA
TranslateMessage
InflateRect
ChildWindowFromPoint
SetDlgItemInt
RegisterClassExW
LoadIconW
GetWindowPlacement
OffsetRect
GetWindowTextA
SetWinEventHook
SetWindowLongA
LoadMenuW
GetWindowLongW
GetWindowTextW
SystemParametersInfoW
SetScrollPos
ReleaseDC
CreateDialogParamA
SetActiveWindow
EndPaint
SetWindowPlacement
CloseClipboard
SetCursor
CharLowerW
GetWindowRect
EnableMenuItem
EmptyClipboard
TranslateAcceleratorA
GetDlgItem
EndDialog
GetSysColor
LoadStringW
CheckDlgButton
LoadAcceleratorsA
ShowWindow
SetMenu
GetSysColorBrush
IsDlgButtonChecked
CreateDialogParamW
AppendMenuA
GetMenuItemCount
IsWindow
PostMessageA
CreateWindowExW
DispatchMessageA
OpenClipboard
SetProcessDefaultLayout
ReleaseCapture
GetDlgItemTextW
SetDlgItemTextW
SendMessageW
EnableWindow
DestroyMenu
LoadCursorA
GetDlgCtrlID
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
GetProcessDefaultLayout
GetClipboardData
gdi32
EndPage
LPtoDP
SetTextColor
DeleteDC
CreateFontIndirectW
CreateFontA
GetDeviceCaps
StretchBlt
CreateFontIndirectA
CreateDCW
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
StartDocW
GetTextFaceW
TextOutW
CreateSolidBrush
ExtTextOutA
winspool.drv
ClosePrinter
GetPrinterDriverW
OpenPrinterW
comdlg32
GetOpenFileNameA
FindTextW
PrintDlgExW
PageSetupDlgW
FindTextA
GetOpenFileNameW
PrintDlgA
ReplaceTextW
advapi32
RegSetValueExW
RegOpenKeyA
ControlService
QueryServiceStatus
RegCreateKeyA
RegDeleteKeyA
RegQueryValueExW
CreateServiceA
RegQueryValueExA
RegSetValueExA
RegCreateKeyW
DeleteService
OpenProcessToken
OpenServiceA
shell32
CommandLineToArgvW
DragQueryFileW
DragAcceptFiles
ShellExecuteExA
ShellExecuteA
Shell_NotifyIconA
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ