GetCurrentInternal_ReportRollbackEvent
Overview
overview
7Static
static
3ASEAN 2024.lnk
windows7-x64
3ASEAN 2024.lnk
windows10-2004-x64
7MS.lnk
windows7-x64
3MS.lnk
windows10-2004-x64
7Mofa memo.lnk
windows7-x64
3Mofa memo.lnk
windows10-2004-x64
7NS.lnk
windows7-x64
3NS.lnk
windows10-2004-x64
7_/_/_/_/_/...oy.dll
windows7-x64
3_/_/_/_/_/...oy.dll
windows10-2004-x64
3_/_/_/_/_/...ce.exe
windows7-x64
6_/_/_/_/_/...ce.exe
windows10-2004-x64
6Static task
static1
Behavioral task
behavioral1
Sample
ASEAN 2024.lnk
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ASEAN 2024.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MS.lnk
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
MS.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Mofa memo.lnk
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Mofa memo.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
NS.lnk
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
NS.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
_/_/_/_/_/_/_/_/_/_/_/_/GetCurrentDeploy.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
_/_/_/_/_/_/_/_/_/_/_/_/GetCurrentDeploy.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
_/_/_/_/_/_/_/_/_/_/_/_/office.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
_/_/_/_/_/_/_/_/_/_/_/_/office.exe
Resource
win10v2004-20240802-en
General
-
Target
ASEANNotes.rar
-
Size
82KB
-
MD5
0b60461d17d44766184535abdbe5e6ac
-
SHA1
62c1ffe72cb31f945e046e03809eb80a64f4127a
-
SHA256
307b614797a7f18a8a76cfe82d3c8d65d531e485e6addcf86aaaf8b6071e434e
-
SHA512
49dc033b5cf2157cbc78fe2fab3e82d16883f8cf661e28aba74b6cf07fcfed311bdf8f2cd5e4638a8896128616841db1d7c0e837a7626f999131df620f0c69da
-
SSDEEP
1536:XD1UfVm4xeAqweIY2P6SfKTsZL6I8XHqFHqIMHvFZjJBvA2wQ0qYmNoMAhIj:z1U9PxeAqg6AbUXqxMPFZX4PqYmNoMAW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/_/_/_/_/_/_/_/_/_/_/_/_/GetCurrentDeploy.dll
Files
-
ASEANNotes.rar.rar
-
ASEAN 2024.lnk.lnk
-
MS.lnk.lnk
-
Mofa memo.lnk.lnk
-
NS.lnk.lnk
-
_/_/_/_/_/_/_/_/_/_/_/_/GetCurrentDeploy.dll.dll windows:6 windows x86 arch:x86
875f574dcff445409dddf1cec9bda686
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LocalFree
GetModuleHandleW
CopyFileW
WriteConsoleW
GetModuleFileNameW
CreateFileW
GetCommandLineW
GetModuleFileNameA
CloseHandle
CreateDirectoryW
SetFilePointerEx
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RaiseException
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
DecodePointer
user32
ShowWindow
RegisterClassW
CreateWindowExW
DefWindowProcW
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
shell32
CommandLineToArgvW
Exports
Exports
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
_/_/_/_/_/_/_/_/_/_/_/_/office.exe.exe windows:6 windows x86 arch:x86
2ae9bf6945520a50b8cb5fbbd431dc99
Code Sign
33:00:00:01:3f:89:41:98:7a:62:6b:86:4c:00:00:00:00:01:3fCertificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before23/10/2019, 23:17Not After21/01/2021, 23:17SubjectCN=Microsoft Time-Stamp Service,OU=Microsoft Ireland Operations Limited+OU=Thales TSS ESN:FC41-4BD4-D220,O=Microsoft Corporation,L=Redmond,ST=WA,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:e4:7c:fc:02:95:60:ff:84:fb:00:02:00:00:01:e4Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before02/05/2019, 21:20Not After02/05/2020, 21:20SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:04:35:45:00:00:00:00:00:3fCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before20/09/2018, 17:42Not After09/05/2021, 23:28SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:01:52:9b:40:9f:50:56:99:75:88:00:00:00:00:01:52Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before02/05/2019, 21:37Not After02/05/2020, 21:37SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
f3:6d:2f:5e:9f:95:82:28:12:ea:b9:59:71:b7:17:84:34:af:b6:67:54:dd:fc:37:a0:de:37:58:a3:22:ba:feSigner
Actual PE Digestf3:6d:2f:5e:9f:95:82:28:12:ea:b9:59:71:b7:17:84:34:af:b6:67:54:dd:fc:37:a0:de:37:58:a3:22:ba:feDigest Algorithmsha256PE Digest Matchestruef6:6b:59:4f:df:1d:31:aa:9a:d1:d5:db:c4:28:c8:99:69:73:40:03Signer
Actual PE Digestf6:6b:59:4f:df:1d:31:aa:9a:d1:d5:db:c4:28:c8:99:69:73:40:03Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
GetCurrentRollback.pdb
Imports
kernel32
FreeLibrary
LoadLibraryExW
GetLastError
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
OutputDebugStringA
InterlockedCompareExchange
InterlockedExchange
Sleep
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
msvcrt
___lc_codepage_func
__iob_func
fclose
fflush
fgetc
fgetpos
fsetpos
fseek
fwrite
setvbuf
ungetc
fgetwc
fputwc
ungetwc
free
_CxxThrowException
memset
setlocale
malloc
_callnewh
__pctype_func
__mb_cur_max
__crtGetStringTypeW
__crtLCMapStringW
abort
_XcptFilter
__p__commode
_amsg_exit
__wgetmainargs
__set_app_type
exit
___lc_handle_func
_cexit
__p__fmode
__setusermatherr
_initterm
__uncaught_exception
??1type_info@@UAE@XZ
memcpy
memmove
_lock
_unlock
__dllonexit
_onexit
?terminate@@YAXXZ
_controlfp
isleadbyte
_fileno
_iob
_snprintf
_itoa
wctomb
__badioinfo
__pioinfo
_isatty
_write
_lseeki64
___mb_cur_max_func
__CxxFrameHandler
_errno
strcspn
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@ABQBD@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0bad_cast@@QAE@ABV0@@Z
??1bad_cast@@UAE@XZ
localeconv
memchr
_exit
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ