HvTkcoed
Static task
static1
Behavioral task
behavioral1
Sample
1f90096f9f7650241526b66235d307657364d3f6a826611a88e850a4ec830c86_JC.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1f90096f9f7650241526b66235d307657364d3f6a826611a88e850a4ec830c86_JC.dll
Resource
win10v2004-20230703-en
General
-
Target
1f90096f9f7650241526b66235d307657364d3f6a826611a88e850a4ec830c86_JC.dll
-
Size
89KB
-
MD5
30488712664018a5c1b3cf066246a280
-
SHA1
d418b1e4b393f62e7ab4f9358bb9c052845110c2
-
SHA256
1f90096f9f7650241526b66235d307657364d3f6a826611a88e850a4ec830c86
-
SHA512
750d4064bb569f363d5f954a04f1aeec5f482bd31fde8d8935045f19b29ca6eac0dca934b3ae38b0f3d5c883c19316098c8b989bd5b971bb1e715fb03ea8c226
-
SSDEEP
1536:I4Rb6rt3CdRt1Nwok29JTRu+XtsSX39V8HP17sWGcdFzGWQHF82TwIduGu:J1EdWRt1NXJTzN2fFSWQl7juG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f90096f9f7650241526b66235d307657364d3f6a826611a88e850a4ec830c86_JC.dll
Files
-
1f90096f9f7650241526b66235d307657364d3f6a826611a88e850a4ec830c86_JC.dll.dll windows x86
414a25134c9df3a745c17ae6c307411c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAlloc
VirtualFree
GetModuleHandleExW
LoadResource
LockResource
SizeofResource
FindResourceW
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetModuleFileNameW
ExitProcess
RaiseException
EncodePointer
LoadLibraryExW
GetProcAddress
FreeLibrary
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
DecodePointer
oleaut32
SafeArrayCopy
OaBuildVersion
VarCyFromDec
SysReAllocString
OleLoadPictureFile
OleLoadPictureEx
VarUI4FromUI2
odbc32
ord265
ord69
ord53
ord170
ord20
VFreeErrors
ws2_32
WSACleanup
WSAGetLastError
ntohs
WSAEnumNetworkEvents
WSALookupServiceBeginW
WSAAsyncGetServByPort
inet_ntoa
gethostbyname
resutils
ResUtilGetSzValue
ResUtilFreeParameterBlock
ResUtilGetBinaryProperty
ResUtilSetPropertyTable
ResUtilVerifyPrivatePropertyList
wsock32
ord1111
winspool.drv
SetPortW
SeekPrinter
EnumJobsA
DeletePrintProvidorA
EnumFormsW
DeviceCapabilitiesA
loadperf
UnloadPerfCounterTextStringsW
UnloadPerfCounterTextStringsA
LoadPerfCounterTextStringsA
LoadPerfCounterTextStringsW
wsnmp32
ord401
ord320
ord205
ord302
ord200
ord604
ord106
Exports
Exports
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ