Static task
static1
Behavioral task
behavioral1
Sample
repack-oymjcvg.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
repack-oymjcvg.dll
Resource
win10v2004-20230220-en
General
-
Target
repack-oymjcvg.cpl
-
Size
1.3MB
-
MD5
5df0fc410fb4264e62a7e67b2a10e52d
-
SHA1
a6a8aba098ee55c00cc92853aa1e9face47c6064
-
SHA256
60653d8fcb5ad07f4669c2621dcfdcead56685518f66c74d290c9310f84a25ac
-
SHA512
2676ef293f0696876157215c3819e5a163ad2b5463d42946da13e06573f8b06fad962b74e7cf2e88f8afb9e0465aed7edf303bb4038c09c1823f9c88490a276e
-
SSDEEP
24576:yUj6OaGD7vGaQBeSb0ALtCiktluZTrtuC/Ti6JhdCFrpE8DMKQfJlxNVwqtk4Q:3j6OaxBDFLtCiJrZi4CFERKQf//+hP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource repack-oymjcvg.cpl
Files
-
repack-oymjcvg.cpl.dll windows x86
42dbb6f72b4ccf68208d2d626c3ae067
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
send
crypt32
CryptGetDefaultOIDFunctionAddress
wininet
FindFirstUrlCacheEntryExW
kernel32
Module32Next
DeleteTimerQueue
GetConsoleWindow
GetTapeStatus
VirtualProtect
GlobalAddAtomW
GetLocalTime
GetUserDefaultUILanguage
GetSystemInfo
GetFileTime
FindActCtxSectionStringW
FlushConsoleInputBuffer
GetWindowsDirectoryA
DebugBreak
GetTapePosition
GenerateConsoleCtrlEvent
GetLogicalDriveStringsW
CloseHandle
LoadLibraryW
GetCurrentThreadId
OutputDebugStringA
GetModuleHandleA
LoadLibraryExW
SetCommMask
GetUserDefaultLangID
SetTapePosition
GetConsoleProcessList
OpenProcess
GetFileAttributesA
GetTempPathA
GetCPInfo
GetPrivateProfileIntA
LoadLibraryExA
GetLastError
GetComputerNameExW
GetStartupInfoA
GetProfileIntW
lstrcpynW
GlobalGetAtomNameA
DeleteCriticalSection
EnumTimeFormatsA
FindNextVolumeMountPointW
FlushViewOfFile
GetDateFormatA
GetQueuedCompletionStatus
GetUserGeoID
gdi32
GetCurrentObject
EndDoc
PolyPolyline
ExtEscape
GetPaletteEntries
GetOutlineTextMetricsW
GetRasterizerCaps
FrameRgn
ExcludeClipRect
GetTextExtentExPointA
ExtTextOutW
GetDeviceCaps
shlwapi
SHRegDuplicateHKey
msvcrt
strspn
fputws
toupper
fseek
user32
GetMenuItemID
DefMDIChildProcW
IsCharUpperA
GetWindowDC
FindWindowA
GetTabbedTextExtentA
GetUpdateRgn
GetWindowLongW
GetWindowTextA
GetMenuBarInfo
LoadKeyboardLayoutA
GetMenuStringA
GetScrollBarInfo
LoadCursorA
winspool.drv
GetPrinterA
shell32
ExtractIconExA
advapi32
LogonUserExW
DeleteService
EnumServicesStatusW
NotifyBootConfigStatus
SetServiceObjectSecurity
GetSecurityDescriptorDacl
GetWindowsAccountDomainSid
oleaut32
VariantCopyInd
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT0 Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt1 Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vtvlzk Size: 680.6MB - Virtual size: 680.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ