Static task
static1
Behavioral task
behavioral1
Sample
DmOmaCpMo.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
DmOmaCpMo.exe
Resource
win10v2004-20230703-en
General
-
Target
DmOmaCpMo.exe
-
Size
35KB
-
MD5
c32793690257d0843d2b5404806c80c2
-
SHA1
25ad49480b871ed61c8896ace86cdfdc689c79ad
-
SHA256
b1439fbf4752dd19ff35c3405b3e970251bf8a10297a9e556e6caab68126189c
-
SHA512
1247cf55909f94e0353cf044de4a6aa6d91542fd863ad2d56594c8ccbeb6c89967fd9f2c715537cca9d3d4363206e8c25ce1e8d0f5647a5a4f2cedcbd4da3c78
-
SSDEEP
768:ldDGTw+fkc3Y8/BzuMwPu01AKr4r9rBVjnZ3eT/DTP80DgbfrCbtbqKiO1:ldDYO8JGlAKr+BNnZ3ezDT+DrCbRqKr1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DmOmaCpMo.exe
Files
-
DmOmaCpMo.exe.exe windows x64
6d878b9880dc6b64da87bd11bbccf315
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
sprintf_s
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
memcpy_s
_vsnwprintf
memset
_callnewh
_CxxThrowException
_onexit
__dllonexit
_unlock
_lock
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
_commode
_fmode
_acmdln
__C_specific_handler
malloc
_initterm
__setusermatherr
_ismbblead
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
__CxxFrameHandler3
??3@YAXPEAX@Z
api-ms-win-eventing-provider-l1-1-0
EventSetInformation
EventActivityIdControl
EventUnregister
EventWriteTransfer
EventRegister
api-ms-win-core-file-l1-1-0
GetFileSize
ReadFile
api-ms-win-core-processenvironment-l1-1-0
GetCommandLineW
api-ms-win-core-com-l1-1-0
CoUninitialize
CLSIDFromString
CoInitializeEx
StringFromGUID2
api-ms-win-core-heap-l2-1-0
LocalAlloc
LocalFree
api-ms-win-core-errorhandling-l1-1-0
RaiseException
SetUnhandledExceptionFilter
GetLastError
UnhandledExceptionFilter
SetLastError
api-ms-win-core-handle-l1-1-0
CloseHandle
oleaut32
SysFreeString
api-ms-win-core-synch-l1-2-0
SleepConditionVariableSRW
Sleep
WakeAllConditionVariable
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetStartupInfoW
GetCurrentProcess
api-ms-win-core-libraryloader-l1-2-0
GetProcAddress
GetModuleHandleExW
GetModuleHandleW
GetModuleFileNameA
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-rtlsupport-l1-1-0
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
omadmapi
ord64
ord44
dmcmnutils
CopyString
dmprocessxmlfiltered
MdmProcessConfigXmlWithAttributes
dsclient
DSOpenSharedFile
rpcrt4
UuidCreate
UuidFromStringW
api-ms-win-core-heap-l1-1-0
HeapFree
GetProcessHeap
HeapAlloc
api-ms-win-core-winrt-string-l1-1-0
WindowsCreateStringReference
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-winrt-l1-1-0
RoActivateInstance
RoUninitialize
RoInitialize
api-ms-win-core-debug-l1-1-0
DebugBreak
IsDebuggerPresent
OutputDebugStringW
api-ms-win-core-synch-l1-1-0
OpenSemaphoreW
ReleaseMutex
WaitForSingleObject
AcquireSRWLockExclusive
CreateMutexExW
ReleaseSRWLockExclusive
ReleaseSemaphore
CreateSemaphoreExW
WaitForSingleObjectEx
dmenrollengine
GetEnrollmentType
msvcp110_win
?_Xbad_alloc@std@@YAXXZ
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ