HvTkcoed
Static task
static1
Behavioral task
behavioral1
Sample
e3ea65b38a4eb605164d335f9b6cd6a16011e49fa33817aca5c4b1a4c62e0202.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e3ea65b38a4eb605164d335f9b6cd6a16011e49fa33817aca5c4b1a4c62e0202.dll
Resource
win10v2004-20230703-en
General
-
Target
9bf676847bad02bcf7bae2bd18b0b8f1.bin
-
Size
7KB
-
MD5
df32db20cd8fbbbb7c40c144f9b66c16
-
SHA1
25533a15ddbd023970872b637d8fc09c7838efc5
-
SHA256
0367aa27422fddcce441e737a3e11c19523b2cf8a1fe4a0f658538d8aff82e25
-
SHA512
04ef383b6ffcf4632e35a5027a7d8458c2995ae4bd471c3089caa33479ddda4820a1a32da986bdeb19222d5843db6d6f9076d711ab555d6d841748e367501b66
-
SSDEEP
192:OgnioJKUj0xH6o3YgGRf8MnMu+v36X6R5p9tjVDl:OgnioLj0IF+v3k6xVDl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e3ea65b38a4eb605164d335f9b6cd6a16011e49fa33817aca5c4b1a4c62e0202.dll
Files
-
9bf676847bad02bcf7bae2bd18b0b8f1.bin.zip
Password: infected
-
e3ea65b38a4eb605164d335f9b6cd6a16011e49fa33817aca5c4b1a4c62e0202.dll.dll windows x86
Password: infected
f010843a52db470e0d3050e7610f589f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
free
malloc
_initterm
kernel32
FindResourceW
SizeofResource
VirtualAlloc
VirtualFree
GetModuleHandleExW
LoadResource
LockResource
setupapi
SetupRenameErrorA
SetupDiGetDeviceInfoListDetailA
SetupQueryInfFileInformationA
SetupDiAskForOEMDisk
SetupDiSetClassInstallParamsA
wsnmp32
ord100
ord202
ord104
ord320
ord504
ord601
ord600
rtm
RtmAddRoute
RtmGetRouteAge
MgmGetNextMfe
RtmBlockConvertRoutesToStatic
RtmCloseEnumerationHandle
MgmDeRegisterMProtocol
RtmDeleteRouteTable
mpr
WNetGetResourceParentA
WNetCancelConnection2A
MultinetGetConnectionPerformanceA
WNetGetProviderNameW
WNetUseConnectionA
avifil32
AVIStreamStart
AVIFileAddRef
AVIStreamCreate
EditStreamSetInfoW
msvfw32
DrawDibDraw
winspool.drv
EnumJobsA
AddPrinterA
AddPortW
ord209
AddJobA
ws2_32
htons
WSAAddressToStringA
send
ioctlsocket
WSAAccept
WSARecvDisconnect
gethostbyname
WSACreateEvent
user32
UnregisterClassW
GetMonitorInfoW
DdeAddData
ChangeDisplaySettingsA
SetScrollInfo
DrawStateW
GetClassLongW
Exports
Exports
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ