ReflectiveLoader
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded.dll
Resource
win10v2004-20230831-en
General
-
Target
CVE-2022-21882.x64.dll
-
Size
56KB
-
MD5
7f4ae0a31b3d2ad12c681be1b6e74a57
-
SHA1
1467743cfd37209f1241d45ebafbb6fe21c381a6
-
SHA256
3fa8dbb0d767cde4b1f8f194dce509c51b1323e54e122bdc3c5019688ba46e79
-
SHA512
666b3ec08fcf1eb9b9ac379d49858bee155b011dd4b47e660b35cd080750df796abfbd56c62f011a35e179d1729ca704ff482fa525d66a54cdebe8f4a259a089
-
SSDEEP
1536:NDZHYykbVphQXtEw6OxOnnkH80mUHPcaXHWNb+sbu:FJYy2+tgOxNVmUHPcaX29+Mu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded/framework/data/exploits/CVE-2022-21882/CVE-2022-21882.x64.dll
Files
-
CVE-2022-21882.x64.dll.zip
Password: S@ndb0x!2023@@
-
Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded/framework/data/exploits/CVE-2022-21882/CVE-2022-21882.x64.dll.dll windows x64
Password: S@ndb0x!2023@@
07f1145e1e72b0ab04c05dce587a9af1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
GetCurrentProcessId
CreateThread
VirtualAlloc
VirtualProtect
VirtualQuery
GetProcAddress
LoadLibraryA
LocalAlloc
LocalFree
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
InterlockedFlushSList
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
user32
SetWindowLongPtrA
SetWindowLongA
GetWindowRect
GetMenuBarInfo
DestroyWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
CreateMenu
Exports
Exports
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
manifest.json