e:\Kysource_v2\kybase\source\application\mtcontain\Release\mtcontain.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2a1ca62311fc416144f081e1b79fcb1cca40eb6da24de9916d6f90095440bf79N.dll
Resource
win7-20240903-en
General
-
Target
2a1ca62311fc416144f081e1b79fcb1cca40eb6da24de9916d6f90095440bf79N.exe
-
Size
240KB
-
MD5
4c7e8e6b0b27576220989a77779b20c0
-
SHA1
3bfb438b0b65340eb5d86b6799cf8a87fc4215c6
-
SHA256
2a1ca62311fc416144f081e1b79fcb1cca40eb6da24de9916d6f90095440bf79
-
SHA512
c8540474d1029d61328d9cafec601bf33672f84fd2cfb9c3940a036346a1294fc2ac9142b15c4d9d79fcfc38ed7b222eacb005321c966e6137920ccdd3309538
-
SSDEEP
3072:43Z4B+8x2fCFIpcLy1n5lB7GrDWwqrlK4tb1sA622USAz3y184D:43KB+8A6FecLq1BwytF6DYC11D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a1ca62311fc416144f081e1b79fcb1cca40eb6da24de9916d6f90095440bf79N.exe
Files
-
2a1ca62311fc416144f081e1b79fcb1cca40eb6da24de9916d6f90095440bf79N.exe.dll regsvr32 windows:4 windows x86 arch:x86
3ea3666678bf37773b6c949e4af02bcd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
FlushFileBuffers
GetSystemInfo
VirtualProtect
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetFilePointer
LoadLibraryA
GetCPInfo
GetOEMCP
IsBadReadPtr
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
TlsGetValue
TlsSetValue
TlsFree
GetLastError
SetLastError
OutputDebugStringW
GetModuleFileNameW
InterlockedIncrement
GetLocaleInfoA
GetACP
InterlockedExchange
RaiseException
MultiByteToWideChar
GetModuleHandleW
GetProcAddress
GetVersionExA
GetCurrentThreadId
InterlockedDecrement
lstrlenW
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcess
FlushInstructionCache
FindResourceExW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
IsBadCodePtr
TlsAlloc
SetUnhandledExceptionFilter
HeapSize
TerminateProcess
GetModuleHandleA
IsBadWritePtr
RtlUnwind
ExitProcess
HeapReAlloc
GetCommandLineA
VirtualQuery
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
user32
UnregisterClassW
IsWindow
SendMessageW
SetWindowLongW
SystemParametersInfoA
GetSystemMetrics
PostMessageW
InflateRect
IntersectRect
GetWindowDC
ClientToScreen
ScreenToClient
SystemParametersInfoW
DrawTextW
SetCapture
GetCapture
GetDlgCtrlID
GetParent
SetCursor
InvalidateRect
ReleaseCapture
CreateWindowExW
RegisterClassExW
CallWindowProcW
GetWindowLongW
DefWindowProcW
EndPaint
BeginPaint
LoadBitmapW
DestroyWindow
DestroyCursor
LoadImageW
GetDC
ReleaseDC
LoadCursorW
wsprintfW
GetClassInfoExW
SetWindowRgn
SetParent
EnableWindow
ShowWindow
GetClientRect
GetWindowRect
SetWindowPos
gdi32
CreateBitmap
CreatePatternBrush
CreateRectRgnIndirect
SetRectRgn
SelectClipRgn
GetClipBox
PatBlt
SetBkColor
ExtTextOutW
SetBkMode
CreateCompatibleDC
SelectObject
BitBlt
PtInRegion
DeleteDC
CombineRgn
CreateFontIndirectW
CreateRectRgn
GetObjectW
DeleteObject
GetDIBits
SetTextColor
advapi32
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegDeleteKeyW
ole32
StringFromCLSID
CoTaskMemFree
CoCreateInstance
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE