E:\work\ooooooops\181\knock_v1.1.8\knock\bin64\knock.pdb
Behavioral task
behavioral1
Sample
Run-Malware-1.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Run-Malware-1.bat
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
f4d2c9470b322af29b9188a3a590cbe85bacb9cc8fcd7c2e94d82271ded3f659.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
f4d2c9470b322af29b9188a3a590cbe85bacb9cc8fcd7c2e94d82271ded3f659.dll
Resource
win11-20240802-en
General
-
Target
Malware-1.zip
-
Size
77KB
-
MD5
17eac32b01798242a64fddbbe3be6ba4
-
SHA1
4adc8c04e7c3365964d5bd9468f9bff7962412ce
-
SHA256
371cf9bcf9a3d7b11d5ac386bef9450beac8c66a546fea1ca9cf629cdb751825
-
SHA512
0df2923d79286539b822459c95f67bb448d0bf4b0f658ce2da866459493a124b8135b3c8e2aa25b50834160acc90c6b6bf7d9401d8a96ba595efa421c0036b8e
-
SSDEEP
1536:Ykufy0tKCFt2ROXpIF9Y59OSybohv5AsYToeYuerTrwPzgh99hUgMQd1c:YkuaI7b2ROZMKOSN5ATTben8Lg9963QQ
Malware Config
Extracted
warmcookie
72.5.43.29
-
mutex
a208f030-25f9-4f41-8b57-6b0b7ecccf29
-
user_agent
Mozilla / 5.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.0.3705)
Signatures
-
Warmcookie family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f4d2c9470b322af29b9188a3a590cbe85bacb9cc8fcd7c2e94d82271ded3f659.dll
Files
-
Malware-1.zip.zip
-
Run-Malware-1.bat
-
f4d2c9470b322af29b9188a3a590cbe85bacb9cc8fcd7c2e94d82271ded3f659.dll.dll regsvr32 windows:6 windows x64 arch:x64
4e07c2fd62376d20191892e1e1215fcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetLastError
SetLastError
ExpandEnvironmentStringsW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
DeleteFileW
GetVolumeInformationW
ReadFile
RemoveDirectoryW
SetFilePointer
WriteFile
SetHandleInformation
CreatePipe
PeekNamedPipe
WaitForSingleObject
CreateMutexW
CreateThread
TerminateProcess
CreateProcessW
GlobalMemoryStatusEx
GetTickCount
GetComputerNameExW
GetModuleFileNameW
GetComputerNameW
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
GetTempFileNameW
GetTempPathW
GetSystemDirectoryW
LocalFree
Sleep
CloseHandle
LoadLibraryW
GetProcAddress
GetModuleHandleW
OpenMutexW
RaiseException
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetACP
GetStdHandle
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
SetStdHandle
GetSystemInfo
advapi32
SystemFunction036
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
shell32
SHGetFolderPathW
ole32
CoTaskMemFree
ws2_32
gethostbyname
inet_ntoa
gethostname
WSAStartup
WSACleanup
Exports
Exports
DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ