HvTkcoed
Static task
static1
Behavioral task
behavioral1
Sample
099740fd0b622207dcaa16788422e886ac8fab2d05be0d283627f873a1dc0c3c_JC.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
099740fd0b622207dcaa16788422e886ac8fab2d05be0d283627f873a1dc0c3c_JC.dll
Resource
win10v2004-20230703-en
General
-
Target
099740fd0b622207dcaa16788422e886ac8fab2d05be0d283627f873a1dc0c3c_JC.dll
-
Size
89KB
-
MD5
a868317d763b4a55ff1aa6429914b558
-
SHA1
7b0d15af64702f8004fb05ba9a49173acdb50234
-
SHA256
099740fd0b622207dcaa16788422e886ac8fab2d05be0d283627f873a1dc0c3c
-
SHA512
46210017ab25ae9be21d2ba686a69e1337cd104b540c46a5015c13b6b9823009320905525ff214e44a76176680195a962acdd689f4ec1e60f5810baeec7f8c31
-
SSDEEP
1536:A4Rb6rt3CdRt1Nwok29JTRu+XtsSX39V8HP17sWGcdF7GWAGYuZSDuGu:R1EdWRt1NXJTzN2fFKWA1WSDuG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 099740fd0b622207dcaa16788422e886ac8fab2d05be0d283627f873a1dc0c3c_JC.dll
Files
-
099740fd0b622207dcaa16788422e886ac8fab2d05be0d283627f873a1dc0c3c_JC.dll.dll windows x86
414a25134c9df3a745c17ae6c307411c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAlloc
VirtualFree
GetModuleHandleExW
LoadResource
LockResource
SizeofResource
FindResourceW
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetModuleFileNameW
ExitProcess
RaiseException
EncodePointer
LoadLibraryExW
GetProcAddress
FreeLibrary
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
DecodePointer
oleaut32
SafeArrayCopy
OaBuildVersion
VarCyFromDec
SysReAllocString
OleLoadPictureFile
OleLoadPictureEx
VarUI4FromUI2
odbc32
ord265
ord69
ord53
ord170
ord20
VFreeErrors
ws2_32
WSACleanup
WSAGetLastError
ntohs
WSAEnumNetworkEvents
WSALookupServiceBeginW
WSAAsyncGetServByPort
inet_ntoa
gethostbyname
resutils
ResUtilGetSzValue
ResUtilFreeParameterBlock
ResUtilGetBinaryProperty
ResUtilSetPropertyTable
ResUtilVerifyPrivatePropertyList
wsock32
ord1111
winspool.drv
SetPortW
SeekPrinter
EnumJobsA
DeletePrintProvidorA
EnumFormsW
DeviceCapabilitiesA
loadperf
UnloadPerfCounterTextStringsW
UnloadPerfCounterTextStringsA
LoadPerfCounterTextStringsA
LoadPerfCounterTextStringsW
wsnmp32
ord401
ord320
ord205
ord302
ord200
ord604
ord106
Exports
Exports
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ