icavogeye
Static task
static1
Behavioral task
behavioral1
Sample
c6a97c7cdf175de77ac90f0b3d0986b4.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6a97c7cdf175de77ac90f0b3d0986b4.dll
Resource
win10v2004-20240226-en
General
-
Target
c6a97c7cdf175de77ac90f0b3d0986b4
-
Size
580KB
-
MD5
c6a97c7cdf175de77ac90f0b3d0986b4
-
SHA1
ddae854c745adce390e6dc62bb0047614871c4ed
-
SHA256
ccd873423f4ba72513e398c9aabe2a6caa2b84d538839b8835ce32efca51dd6a
-
SHA512
81c2e68df2da9212098e1b0c6501d67e5b95580f06ba90e3533f191849bb1c581d915b2e1b415b7956cda2a6b1120822d4747f4425b2ca5075ef1e26e0094f08
-
SSDEEP
12288:cS5PUxKuV8LCTezTiwjq7QVXH5EDYiqW:cFvKBiF7Q88Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c6a97c7cdf175de77ac90f0b3d0986b4
Files
-
c6a97c7cdf175de77ac90f0b3d0986b4.dll windows:4 windows x86 arch:x86
40343bf3dfffffec5547bb48bb0dca61
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FileTimeToSystemTime
GetTimeZoneInformation
SetEndOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
CompareStringW
CompareStringA
InterlockedExchange
HeapSize
RtlUnwind
InitializeCriticalSection
SetFilePointer
VirtualQuery
GetSystemInfo
VirtualProtect
VirtualAlloc
SetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCPInfo
UnhandledExceptionFilter
SetEnvironmentVariableW
SetEnvironmentVariableA
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
ReadFile
FileTimeToLocalFileTime
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
DeleteCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
GetVersionExA
CreateThread
GetCurrentThreadId
ExitThread
GetFileAttributesA
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
FindClose
FindNextFileA
FindFirstFileA
GetExitCodeThread
LoadLibraryA
GetProcAddress
FreeLibrary
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetLastError
FormatMessageA
LocalFree
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
GetCurrencyFormatA
OutputDebugStringA
GetDriveTypeA
GetFullPathNameA
GetCurrentDirectoryA
WriteFile
Beep
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 548KB - Virtual size: 547KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ