DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
Details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
disallowable/resentful.cmd
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
disallowable/resentful.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
disallowable/staunchly.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
disallowable/staunchly.dll
Resource
win10v2004-20220901-en
General
-
Target
DE4.zip
-
Size
382KB
-
MD5
c93818917140fec3843eb815f0288362
-
SHA1
6d5c3c1dc60d57ad9e525ee3250041308d74f487
-
SHA256
3c9a4e32c17ea4546ffff39815cff84e0e760bdacb17e87d34f7e9c08532c07d
-
SHA512
ba9af813e81275ff70d64778bfd71a9fc9ff6e42bebad0f8a34c6666e0ff893423195e57b51957328c458b652d188b38e23d1efb9ad9c8755d1489e7e291cef9
-
SSDEEP
6144:nJEbarh8l+jC53mQPEH8uqD305/6U7EHH93xB7lxlyVhbGIfhAevM87EJY2qxLmn:nKbarhFsvEHNqT0h6V93jlbyVhbGahA7
Malware Config
Signatures
Files
-
DE4.zip.zip
Password: PG1
-
Details8882.zip.zip
Password: PG1
-
Details8882.iso.iso
Password: PG1
-
Details.lnk.lnk
-
disallowable/plod.txt
-
disallowable/replicates.txt
-
disallowable/resentful.cmd
-
disallowable/staunchly.dat.dll regsvr32 windows x86
Password: PG1
fae84ade86333bc16f134b64e603e945
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
HeapCreate
CreateNamedPipeA
LockFile
PeekNamedPipe
GetCurrentThreadId
HeapWalk
GetModuleHandleA
SetCurrentDirectoryA
GetCommandLineA
GetFileInformationByHandle
CallNamedPipeA
GetLastError
CreateFileA
GetCurrentThread
DeleteFileA
CloseHandle
CreateThread
GetWindowsDirectoryA
UnlockFile
GetProcAddress
GetFileSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
LCMapStringW
GetStdHandle
GetFileType
GetACP
GetStringTypeW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapSize
HeapReAlloc
SetFilePointerEx
WriteConsoleW
ReadFile
ReadConsoleW
DecodePointer
CreateFileW
RaiseException
Exports
Exports
Sections
.text Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ