E:\work\ooooooops\181\knock_v1.1.8\knock\bin64\knock.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
b7aec5f73d2a6bbd8cd920edb4760e2edadc98c3a45bf4fa994d47ca9cbd02f6.dll
Resource
win10ltsc2021-20241023-en
General
-
Target
59b7b8d29252a9128536fbd08d24375f.bin
-
Size
79KB
-
MD5
4652ddba01232a4e9baca5936913d42a
-
SHA1
daddabc9e73c490e3eb23c288fda28942fc8efb6
-
SHA256
3c71282d1c53a16d7ac1687e0288801a062dde870c07aba9f23f6b962d537f9f
-
SHA512
ad16831eb5e7e53f118f896e06f027aabe13ef5e51106c1d6a2a96c941838c74d50ab0964dd1d6352e622fbb950b40fc858037c1de63eaeef441f2f3c5db1412
-
SSDEEP
1536:ReO+mbllkkxPYU1lFbHdqFEobR0MLhbmnGlHO4y23i3eauALGn0DcbwH2HevpsxA:3+mNx7lJ9q++0MknGqzq32ckH2Hevf
Malware Config
Extracted
warmcookie
72.5.43.29
-
mutex
7d0cec31-c3bc-4593-ad4a-8c140904383e
-
user_agent
Mozilla / 5.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.0.3705)
Signatures
-
Warmcookie family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b7aec5f73d2a6bbd8cd920edb4760e2edadc98c3a45bf4fa994d47ca9cbd02f6.exe
Files
-
59b7b8d29252a9128536fbd08d24375f.bin.zip
Password: infected
-
b7aec5f73d2a6bbd8cd920edb4760e2edadc98c3a45bf4fa994d47ca9cbd02f6.exe.dll regsvr32 windows:6 windows x64 arch:x64
Password: infected
4e07c2fd62376d20191892e1e1215fcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetLastError
SetLastError
ExpandEnvironmentStringsW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
DeleteFileW
GetVolumeInformationW
ReadFile
RemoveDirectoryW
SetFilePointer
WriteFile
SetHandleInformation
CreatePipe
PeekNamedPipe
WaitForSingleObject
CreateMutexW
CreateThread
TerminateProcess
CreateProcessW
GlobalMemoryStatusEx
GetTickCount
GetComputerNameExW
GetModuleFileNameW
GetComputerNameW
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
GetTempFileNameW
GetTempPathW
GetSystemDirectoryW
LocalFree
Sleep
CloseHandle
LoadLibraryW
GetProcAddress
GetModuleHandleW
OpenMutexW
RaiseException
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetACP
GetStdHandle
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
SetStdHandle
GetSystemInfo
advapi32
SystemFunction036
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
shell32
SHGetFolderPathW
ole32
CoTaskMemFree
ws2_32
gethostbyname
inet_ntoa
gethostname
WSAStartup
WSACleanup
Exports
Exports
DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ