HvTkcoed
Static task
static1
Behavioral task
behavioral1
Sample
54ad39b23ec8af5663fc01b0c19ffd03cff8f92e9865944828135da4bfa0746c_JC.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
54ad39b23ec8af5663fc01b0c19ffd03cff8f92e9865944828135da4bfa0746c_JC.dll
Resource
win10v2004-20230703-en
General
-
Target
54ad39b23ec8af5663fc01b0c19ffd03cff8f92e9865944828135da4bfa0746c_JC.dll
-
Size
89KB
-
MD5
8668f9c2351ca615d305ce897b1b0de9
-
SHA1
700ac257389189498b8e753eeee1123e44443188
-
SHA256
54ad39b23ec8af5663fc01b0c19ffd03cff8f92e9865944828135da4bfa0746c
-
SHA512
9e489065455564fc9af0f678a13712de377c1ec4c1a3c6313aa4c504b179c57057a70f00e8b3e376d3e0297bee87dc1c019a5b6683cf11369208f09eef2c09ce
-
SSDEEP
1536:y4Rb6rt3CdRt1Nwok29JTRu+XtsSX39V8HP17sWGcdF3GWM8Hv/bkFhIuGu:z1EdWRt1NXJTzN2fF2WMIv/bkF2uG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54ad39b23ec8af5663fc01b0c19ffd03cff8f92e9865944828135da4bfa0746c_JC.dll
Files
-
54ad39b23ec8af5663fc01b0c19ffd03cff8f92e9865944828135da4bfa0746c_JC.dll.dll windows x86
414a25134c9df3a745c17ae6c307411c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAlloc
VirtualFree
GetModuleHandleExW
LoadResource
LockResource
SizeofResource
FindResourceW
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetModuleFileNameW
ExitProcess
RaiseException
EncodePointer
LoadLibraryExW
GetProcAddress
FreeLibrary
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
DecodePointer
oleaut32
SafeArrayCopy
OaBuildVersion
VarCyFromDec
SysReAllocString
OleLoadPictureFile
OleLoadPictureEx
VarUI4FromUI2
odbc32
ord265
ord69
ord53
ord170
ord20
VFreeErrors
ws2_32
WSACleanup
WSAGetLastError
ntohs
WSAEnumNetworkEvents
WSALookupServiceBeginW
WSAAsyncGetServByPort
inet_ntoa
gethostbyname
resutils
ResUtilGetSzValue
ResUtilFreeParameterBlock
ResUtilGetBinaryProperty
ResUtilSetPropertyTable
ResUtilVerifyPrivatePropertyList
wsock32
ord1111
winspool.drv
SetPortW
SeekPrinter
EnumJobsA
DeletePrintProvidorA
EnumFormsW
DeviceCapabilitiesA
loadperf
UnloadPerfCounterTextStringsW
UnloadPerfCounterTextStringsA
LoadPerfCounterTextStringsA
LoadPerfCounterTextStringsW
wsnmp32
ord401
ord320
ord205
ord302
ord200
ord604
ord106
Exports
Exports
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ