rpcnetp
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume2/WINDOWS/SysWOW64/rpcnetp.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
manifest.json
Resource
win10v2004-20240709-en
General
-
Target
ADGOSS4_2024-07-10_16_40_36.437.zip
-
Size
9KB
-
MD5
7e042985bf7d0bf1a32ac374e97a108a
-
SHA1
e7b42c00e09da98ff0e21b49c5ad119f890f705d
-
SHA256
00004c0c74babfd1a4675b007fb5eaef1cc35913244f3492059961f6469cebac
-
SHA512
9607c25fa9a876f9b2c8b4ebe7acdfe51d6b436e33af21cf9b504521901cdcc8b9c6bcf5c647177ae3f9308f0c853c72f7a57fa35398f39d59ffc26d86e61020
-
SSDEEP
192:NOGq37ywUFHvfCffqWwITCgVbI457O81yjCyzJR1Bkvgtyr72Y81Brx:NOZ7yFHvKHKk98457O8A1Dftyr1Ox
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Device/HarddiskVolume2/WINDOWS/SysWOW64/rpcnetp.exe
Files
-
ADGOSS4_2024-07-10_16_40_36.437.zip.zip
Password: Akumin@2024
-
Device/HarddiskVolume2/WINDOWS/SysWOW64/rpcnetp.exe.exe windows:4 windows x86 arch:x86
Password: Akumin@2024
ff5b6a43b1b731f25aeef3f8dca9cae0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CreateProcessAsUserA
RegisterServiceCtrlHandlerA
OpenProcessToken
RegQueryValueExA
RegDeleteValueA
DuplicateTokenEx
RegCloseKey
RegOpenKeyA
StartServiceCtrlDispatcherA
SetServiceStatus
RegEnumValueA
SetTokenInformation
kernel32
CreateRemoteThread
LocalAlloc
SetThreadPriority
CloseHandle
LoadLibraryA
RtlUnwind
VirtualAllocEx
FreeLibrary
SetStdHandle
GetStdHandle
GetBinaryTypeA
ResumeThread
CreateProcessA
LocalFree
VirtualFreeEx
EnterCriticalSection
CreateFileA
TerminateProcess
lstrlenA
GetCurrentThreadId
CopyFileA
WriteProcessMemory
WaitForSingleObject
TerminateThread
Sleep
OpenProcess
GetSystemDirectoryA
DeleteCriticalSection
InitializeCriticalSection
SetEvent
ExitProcess
GetVersion
GetModuleHandleA
GetCurrentProcessId
LeaveCriticalSection
CreateEventA
ResetEvent
ExitThread
CreateThread
GetProcAddress
lstrcatA
ReadProcessMemory
WaitForMultipleObjects
lstrcpyA
RaiseException
lstrcmpiA
WriteFile
SetFilePointer
GetModuleFileNameA
GetExitCodeThread
user32
CreateWindowExA
SetTimer
GetMessageA
TranslateMessage
RegisterClassA
KillTimer
DispatchMessageA
PostMessageA
PostThreadMessageA
PeekMessageA
PostQuitMessage
wsprintfA
DefWindowProcA
userenv
CreateEnvironmentBlock
wsock32
ioctlsocket
inet_addr
Exports
Exports
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 440B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 1024B - Virtual size: 572B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
manifest.json