NL7Data0404.pdb
Static task
static1
Behavioral task
behavioral1
Sample
NL7Data0404.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NL7Data0404.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
NL7Lexicons001E.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
NL7Lexicons001E.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Netflix mail access checker v2023.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Netflix mail access checker v2023.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
eapahost.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
eapahost.dll
Resource
win10v2004-20240226-en
General
-
Target
2_5393461935649869092.rar
-
Size
2.4MB
-
MD5
9b6b3fdc89cc88ee154d2fab65955f74
-
SHA1
1726fe09fce51ecc7cd223e7b48353e86c1ea940
-
SHA256
8261bb00af31991f4be1aa374435a5fcc551d40e39d2a95c814fff7a35fff480
-
SHA512
9881466516a0d3b29146bfbe4cc44a4dab34a7f2867eb445309a2498645825775c0abdbda8b1473ac502936f3300d873ee09090e6c7c0e1e4855672d94f702e6
-
SSDEEP
49152:qQvQLmqpfK46hJoME8j96fcMkzDJqBnYNBe1ieFaqZS0ah8BoAMV8IT:jQLpfK4oJoMEriz81ICxaqkZaBoAG8IT
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/NL7Data0404.dll unpack001/NL7Lexicons001E.dll unpack001/eapahost.dll
Files
-
2_5393461935649869092.rar.rar
-
NL7Data0404.dll.dll windows:6 windows x64 arch:x64
b9a5cffe10ba517f801fb7c44c89a647
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
realloc
_fileno
_isatty
strncmp
_finite
_iob
_i64tow_s
_CxxThrowException
_XcptFilter
_amsg_exit
_initterm
_wfopen_s
fclose
fseek
__C_specific_handler
fread
_resetstkoflw
_wsplitpath_s
_itow_s
wcsncmp
atoi
_itoa_s
swscanf_s
wcsncpy_s
wcschr
_vsnwprintf
??0exception@@QEAA@AEBQEBD@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
??0exception@@QEAA@AEBV0@@Z
_purecall
memmove
free
??1type_info@@UEAA@XZ
_lock
malloc
_unlock
__dllonexit
_onexit
?terminate@@YAXXZ
ftell
__CxxFrameHandler3
expf
log
logf
memcpy
memset
kernel32
GetTimeZoneInformation
SetEndOfFile
GetLocaleInfoA
ReadFile
GetFileInformationByHandle
WideCharToMultiByte
GetModuleFileNameW
FormatMessageW
WriteFile
SetFilePointer
FlushFileBuffers
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
Sleep
GetLocalTime
GetProcAddress
DisableThreadLibraryCalls
FindResourceW
LoadResource
LocalFree
LoadLibraryExW
InitializeSRWLock
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetLastError
InitializeCriticalSectionAndSpinCount
SetLastError
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetFileSize
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
SizeofResource
LockResource
MultiByteToWideChar
oleaut32
SetErrorInfo
CreateErrorInfo
SysAllocStringByteLen
SysAllocString
SysStringByteLen
VariantCopy
SysFreeString
VariantChangeType
VariantClear
VariantInit
Exports
Exports
LangDataCall
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
NL7Lexicons001E.dll.dll windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Sections
.rsrc Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Netflix mail access checker v2023.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9Certificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before29/04/2021, 00:00Not After28/04/2036, 23:59SubjectCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0d:01:94:cd:1e:31:42:20:51:35:d1:c6:36:e4:e9:baCertificate
IssuerCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USNot Before18/10/2022, 00:00Not After15/10/2025, 23:59SubjectCN=NVIDIA Corporation,OU=1-F,O=NVIDIA Corporation,L=Santa Clara,ST=California,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
05:44:af:f3:94:9d:08:39:a6:bf:db:3f:5f:e5:61:16Certificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before14/07/2023, 00:00Not After13/10/2034, 23:59SubjectCN=DigiCert Timestamp 2023,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:01:09:5e:de:a2:12:7e:92:81:cc:00:00:00:00:01:09Certificate
IssuerCN=Microsoft Windows Third Party Component CA 2012,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before14/09/2023, 19:14Not After04/09/2024, 19:14SubjectCN=Microsoft Windows Hardware Compatibility Publisher,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0b:aa:c1:00:00:00:00:00:09Certificate
IssuerCN=Microsoft Root Certificate Authority 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before18/04/2012, 23:48Not After18/04/2027, 23:58SubjectCN=Microsoft Windows Third Party Component CA 2012,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
af:be:ac:54:10:31:84:e8:a6:65:00:7a:a4:c1:b7:8e:f8:c2:b0:01:4d:ee:f7:13:f2:50:50:bd:77:41:66:caSigner
Actual PE Digestaf:be:ac:54:10:31:84:e8:a6:65:00:7a:a4:c1:b7:8e:f8:c2:b0:01:4d:ee:f7:13:f2:50:50:bd:77:41:66:caDigest Algorithmsha256PE Digest Matchesfalseaf:be:ac:54:10:31:84:e8:a6:65:00:7a:a4:c1:b7:8e:f8:c2:b0:01:4d:ee:f7:13:f2:50:50:bd:77:41:66:caSigner
Actual PE Digestaf:be:ac:54:10:31:84:e8:a6:65:00:7a:a4:c1:b7:8e:f8:c2:b0:01:4d:ee:f7:13:f2:50:50:bd:77:41:66:caDigest Algorithmsha256PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Displacement.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
README.txt
-
eapahost.dll.dll regsvr32 windows:6 windows x64 arch:x64
e9eccb8a69e3172ca648a5ffde15dc05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
eapahost.pdb
Imports
msvcrt
__CxxFrameHandler3
_CxxThrowException
_errno
__C_specific_handler
memset
wcsrchr
__RTtypeid
?name@type_info@@QEBAPEBDXZ
??0exception@@QEAA@AEBQEBDH@Z
wcscpy_s
??0exception@@QEAA@XZ
_XcptFilter
??0exception@@QEAA@AEBQEBD@Z
?what@exception@@UEBAPEBDXZ
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBV0@@Z
memmove
memcpy_s
malloc
free
wcsncpy_s
realloc
memcmp
_amsg_exit
_wtol
swprintf_s
_vsnprintf
_initterm
??1type_info@@UEAA@XZ
_lock
_unlock
__dllonexit
memmove_s
_onexit
_vsnwprintf
_purecall
memcpy
ntdll
EtwEventWrite
EtwGetTraceLoggerHandle
EtwGetTraceEnableLevel
EtwGetTraceEnableFlags
EtwRegisterTraceGuidsW
EtwUnregisterTraceGuids
EtwEventRegister
EtwEventUnregister
EtwEventEnabled
WinSqmSetDWORD
DbgPrint
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
EtwTraceMessage
kernel32
CreateFileMappingW
GetCurrentProcessId
QueryPerformanceCounter
OutputDebugStringA
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
DeleteTimerQueueEx
CloseHandle
CreateFileW
FormatMessageW
GetCurrentThreadId
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
FindResourceExW
FreeLibrary
LoadResource
LoadLibraryExW
GetModuleHandleW
SizeofResource
GetModuleFileNameW
MultiByteToWideChar
RaiseException
GetLastError
GetProcAddress
lstrcmpiW
LoadLibraryW
LocalFree
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapFree
GetProcessHeap
HeapSize
LocalAlloc
GetModuleHandleExW
GetSystemDirectoryW
GetVersionExW
GetSystemInfo
SetLastError
ExpandEnvironmentStringsW
GetSystemTimeAsFileTime
IsDebuggerPresent
DebugBreak
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
advapi32
RegLoadMUIStringW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegQueryInfoKeyW
ole32
CoTaskMemFree
CoUninitialize
CoDisconnectContext
CoCreateInstance
CoInitializeEx
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
ObjectStublessClient12
ObjectStublessClient4
ObjectStublessClient8
ObjectStublessClient7
ObjectStublessClient11
ObjectStublessClient13
ObjectStublessClient6
ObjectStublessClient10
StringFromGUID2
ObjectStublessClient9
CoGetClassObject
ObjectStublessClient5
CoTaskMemAlloc
ObjectStublessClient3
oleaut32
VarUI4FromStr
user32
CharNextW
UnregisterClassA
GetSystemMetrics
netapi32
DsRoleGetPrimaryDomainInformation
DsRoleFreeMemory
rpcrt4
CStdStubBuffer_CountRefs
IUnknown_Release_Proxy
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_QueryInterface
NdrOleAllocate
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_Disconnect
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Connect
NdrOleFree
IUnknown_QueryInterface_Proxy
CStdStubBuffer_AddRef
IUnknown_AddRef_Proxy
NdrCStdStubBuffer_Release
NdrDllRegisterProxy
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrDllUnregisterProxy
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitializeEapHost
UninitializeEapHost
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 49B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ