LangDataCall
Static task
static1
Behavioral task
behavioral1
Sample
NL7Data0404.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NL7Data0404.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
NL7Lexicons001E.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
NL7Lexicons001E.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Netflix mail access checker v2023.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Netflix mail access checker v2023.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
eapahost.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
eapahost.dll
Resource
win10v2004-20230915-en
General
-
Target
Netflix mail access checker v2023.rar
-
Size
10.2MB
-
MD5
276028b6746a2dc0fd3ff5136088e654
-
SHA1
7f1e30c6b7e082c557d7e0fbee95f37f7876f59b
-
SHA256
e3dad6f6b7920967cf4590568a29f80a9b3af37162d93b1018244b35bd19ce21
-
SHA512
e734a446d7edb780585c5d5634853cb7a0ea59c14f191dd1eb0a70801ef3e6536ae5703baafc8c589fdeb168d2a8aa0777f64de173bdc1956d27d486b7459745
-
SSDEEP
196608:pZPhEgy1vSIJaOIyfZ3qy1pCT2rYuhjla/vHAbXEKx2IQqZCjs:pZpDyZSCIyxbCyYR8X54IfC4
Malware Config
Signatures
-
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/NL7Data0404.dll unpack001/NL7Lexicons001E.dll unpack001/Netflix mail access checker v2023.exe unpack001/eapahost.dll
Files
-
Netflix mail access checker v2023.rar.rar
-
NL7Data0404.dll.dll windows:6 windows x64
b9a5cffe10ba517f801fb7c44c89a647
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
msvcrt
realloc
_fileno
_isatty
strncmp
_finite
_iob
_i64tow_s
_CxxThrowException
_XcptFilter
_amsg_exit
_initterm
_wfopen_s
fclose
fseek
__C_specific_handler
fread
_resetstkoflw
_wsplitpath_s
_itow_s
wcsncmp
atoi
_itoa_s
swscanf_s
wcsncpy_s
wcschr
_vsnwprintf
??0exception@@QEAA@AEBQEBD@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
??0exception@@QEAA@AEBV0@@Z
_purecall
memmove
free
??1type_info@@UEAA@XZ
_lock
malloc
_unlock
__dllonexit
_onexit
?terminate@@YAXXZ
ftell
__CxxFrameHandler3
expf
log
logf
memcpy
memset
kernel32
GetTimeZoneInformation
SetEndOfFile
GetLocaleInfoA
ReadFile
GetFileInformationByHandle
WideCharToMultiByte
GetModuleFileNameW
FormatMessageW
WriteFile
SetFilePointer
FlushFileBuffers
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
Sleep
GetLocalTime
GetProcAddress
DisableThreadLibraryCalls
FindResourceW
LoadResource
LocalFree
LoadLibraryExW
InitializeSRWLock
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetLastError
InitializeCriticalSectionAndSpinCount
SetLastError
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetFileSize
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
SizeofResource
LockResource
MultiByteToWideChar
oleaut32
SetErrorInfo
CreateErrorInfo
SysAllocStringByteLen
SysAllocString
SysStringByteLen
VariantCopy
SysFreeString
VariantChangeType
VariantClear
VariantInit
Exports
Exports
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
NL7Lexicons001E.dll.dll windows:6 windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Sections
.rsrc Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Netflix mail access checker v2023.exe.exe windows:5 windows x86
6c117346b0d0bffeaa7c20cbc489c68a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindFileNameA
kernel32
LockResource
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
CreateWindowExA
Sections
.text Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
./;R Size: - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.T$T Size: - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.%~S Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.<Z~ Size: 9.6MB - Virtual size: 9.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
-
README.txt
-
eapahost.dll.dll regsvr32 windows:6 windows x64
e9eccb8a69e3172ca648a5ffde15dc05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
msvcrt
__CxxFrameHandler3
_CxxThrowException
_errno
__C_specific_handler
memset
wcsrchr
__RTtypeid
?name@type_info@@QEBAPEBDXZ
??0exception@@QEAA@AEBQEBDH@Z
wcscpy_s
??0exception@@QEAA@XZ
_XcptFilter
??0exception@@QEAA@AEBQEBD@Z
?what@exception@@UEBAPEBDXZ
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBV0@@Z
memmove
memcpy_s
malloc
free
wcsncpy_s
realloc
memcmp
_amsg_exit
_wtol
swprintf_s
_vsnprintf
_initterm
??1type_info@@UEAA@XZ
_lock
_unlock
__dllonexit
memmove_s
_onexit
_vsnwprintf
_purecall
memcpy
ntdll
EtwEventWrite
EtwGetTraceLoggerHandle
EtwGetTraceEnableLevel
EtwGetTraceEnableFlags
EtwRegisterTraceGuidsW
EtwUnregisterTraceGuids
EtwEventRegister
EtwEventUnregister
EtwEventEnabled
WinSqmSetDWORD
DbgPrint
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
EtwTraceMessage
kernel32
CreateFileMappingW
GetCurrentProcessId
QueryPerformanceCounter
OutputDebugStringA
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
DeleteTimerQueueEx
CloseHandle
CreateFileW
FormatMessageW
GetCurrentThreadId
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
FindResourceExW
FreeLibrary
LoadResource
LoadLibraryExW
GetModuleHandleW
SizeofResource
GetModuleFileNameW
MultiByteToWideChar
RaiseException
GetLastError
GetProcAddress
lstrcmpiW
LoadLibraryW
LocalFree
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapFree
GetProcessHeap
HeapSize
LocalAlloc
GetModuleHandleExW
GetSystemDirectoryW
GetVersionExW
GetSystemInfo
SetLastError
ExpandEnvironmentStringsW
GetSystemTimeAsFileTime
IsDebuggerPresent
DebugBreak
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
advapi32
RegLoadMUIStringW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegQueryInfoKeyW
ole32
CoTaskMemFree
CoUninitialize
CoDisconnectContext
CoCreateInstance
CoInitializeEx
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
ObjectStublessClient12
ObjectStublessClient4
ObjectStublessClient8
ObjectStublessClient7
ObjectStublessClient11
ObjectStublessClient13
ObjectStublessClient6
ObjectStublessClient10
StringFromGUID2
ObjectStublessClient9
CoGetClassObject
ObjectStublessClient5
CoTaskMemAlloc
ObjectStublessClient3
oleaut32
VarUI4FromStr
user32
CharNextW
UnregisterClassA
GetSystemMetrics
netapi32
DsRoleGetPrimaryDomainInformation
DsRoleFreeMemory
rpcrt4
CStdStubBuffer_CountRefs
IUnknown_Release_Proxy
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_QueryInterface
NdrOleAllocate
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_Disconnect
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Connect
NdrOleFree
IUnknown_QueryInterface_Proxy
CStdStubBuffer_AddRef
IUnknown_AddRef_Proxy
NdrCStdStubBuffer_Release
NdrDllRegisterProxy
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrDllUnregisterProxy
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitializeEapHost
UninitializeEapHost
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 49B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ