When Data Mining Conti Leaks Leads to Actual Binaries and to a Hardcoded C2 With an Encryption Key on Tripod.com - Part Three
嗯,用户让我帮忙总结一篇文章的内容,控制在100个字以内,而且不需要特定的开头。我得先仔细看看这篇文章讲的是什么。 文章看起来是关于一个恶意软件的分析,dl2.exe。它提到了很多技术细节,比如注册表操作、动态API解析、文件系统操作等等。这些都是恶意软件常用的手段,用来保持持久性和逃避分析。 用户可能需要一个简洁明了的总结,可能用于报告或者快速了解文章内容。所以我要抓住关键点:dl2.exe的功能、它的恶意行为以及分类。 首先,dl2.exe是一个Windows恶意软件,主要通过注册表操作和文件系统来破坏系统。其次,它具备动态API解析和内存操作的能力,这表明它可能是一个加载器或信息窃取者。最后,它还试图隐藏控制台输出,进一步逃避检测。 把这些点浓缩到100字以内,同时保持信息完整。这样用户就能快速理解文章的核心内容了。 </think> 这篇文章分析了一个名为dl2.exe的恶意软件二进制文件,揭示其通过注册表操作、动态API解析、文件系统操作和系统信息收集等手段实现持久性和反分析能力。该软件具备修改系统策略、隐藏控制台输出等功能,可能用于破坏系统或作为加载器使用。 2026-3-22 17:12:8 Author: ddanchev.blogspot.com(查看原文) 阅读量:1 收藏

Dear blog readers,

 Continuing the "When Data Mining Conti Leaks Leads to Actual Binaries and to a Hardcoded C2 With an Encryption Key on Tripod.com - Part Two" blog post series in this post I'll continue analyzing the next malicious software binary which I obtained by data mining Conti Leaks with a lot of success. 

The actual malicious software binary location URL:

hxxp://shighil.com/dl2.exe

MD5: c2055b7fbaa041d9f68b9d5df9b45edd
SHA-1: e4bd443bd4ce9029290dcd4bb47cb1a01f3b1b06
SHA-256: 342f04c4720590c40d24078d46d9b19d8175565f0af460598171d58f5ffc48f3

Here's the actual analysis.

Executive Summary

dl2.exe is a Windows x86_64 PE executable (849.5 KB) exhibiting characteristics consistent with malicious software. The binary demonstrates sophisticated capabilities including registry manipulation, dynamic API resolution, file system operations, and system information gathering. Analysis identified multiple high-risk behaviors typical of malware, particularly around persistence mechanisms and anti-analysis techniques.

Key Findings

Critical Capabilities (High Severity)

1. Registry Manipulation

2. Dynamic API Resolution

  • Function: sub_40b868 (0x40b868)
  • APIs Used: GetProcAddress, LoadLibrary, GetModuleHandle
  • Risk: High - Common evasion technique to bypass static analysis and API monitoring
  • Details: Dynamically resolves function addresses at runtime, making static detection more difficult

Medium Severity Capabilities

3. File System Operations

  • Functions: sub_423718, sub_4228a4, sub_423360, sub_41aeec
  • APIs Used: CreateFile, DeleteFile, MoveFile, CopyFile, FindFirstFile, FindNextFile, GetFileAttributes
  • Risk: Medium - Can manipulate files on the system

4. System Information Gathering

  • Functions: sub_4542b0, sub_40f0ac, sub_46df44, sub_46d3bc
  • APIs Used: GetVersionExA, GetSystemInfo, GetComputerName, GetUserName
  • Risk: Medium - Fingerprints the system, likely for profiling or anti-VM checks

5. Memory Manipulation

  • Functions: sub_4540e0, sub_453df0, sub_453d10, sub_453b50
  • APIs Used: VirtualAlloc, VirtualProtect, HeapAlloc, HeapFree
  • Risk: Medium - Can change memory protection flags, potentially indicating code injection or unpacking behavior

6. Mutex Creation

  • Function: sub_46be50 (0x46be50)
  • API Used: CreateMutex
  • Risk: Medium - Commonly used for single-instance enforcement in malware

Security Features (Informational)

7. Stack Protection Mechanisms

  • Stack Cookie Initialization (sub_45ca90 at 0x45ca90): Uses multiple entropy sources (GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter) to generate stack cookies
  • Stack Guard Pages (sub_4540e0 at 0x4540e0): Implements guard pages using VirtualQuery, VirtualAlloc, and VirtualProtect

Notable Observations

  • Entry Point: 0x4545a0 (_start)
  • Main Function: 0x46d9f4 (jumps to 0x46da1c)
  • Imported Libraries: ADVAPI32.dll, GDI32.dll, KERNEL32.dll, OLEAUT32.dll, SHELL32.dll, SHLWAPI.dll, USER32.dll, WINSPOOL.DRV, comdlg32.dll, ole32.dll, oledlg.dll
  • Total Functions Identified: 2,616
  • No Network APIs Detected: No direct socket, HTTP, or network communication APIs were found in the analyzed functions (analysis incomplete)
  • No Obvious Encryption Strings: No strings matching common encryption algorithm names were found

Malware Classification

Based on identified capabilities, this binary exhibits behaviors consistent with:

  • System modification malware (registry manipulation, file operations)
  • Information stealer (system information gathering)
  • Potentially a dropper/loader (dynamic API resolution, memory manipulation)

Critical Malicious Capabilities Identified

1. Windows Policy Restriction Manipulation (HIGH SEVERITY)

The binary targets multiple Windows policy registry keys designed to restrict user actions:

Registry Keys Targeted:

  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
    • NoRun - Prevents running programs via Run dialog
    • RestrictRun - Restricts which programs can execute
    • NoDrives - Hides/restricts drive access
    • NoNetConnectDisconnect - Prevents network connections/disconnections
    • NoRecentDocsHistory - Disables recent documents
    • NoClose - Prevents closing windows
  • Software\Microsoft\Windows\CurrentVersion\Policies\Network
    • NoEntireNetwork - Restricts network browsing
  • Software\Microsoft\Windows\CurrentVersion\Policies\Comdlg32
    • Common dialog restrictions

Functions Involved:

2. Console Output Manipulation

  • sub_46be50 (0x46be50) - Opens CONOUT$ device handle, likely for output redirection or hiding console output

3. Persistence & Configuration

The binary uses both registry and INI file storage for configuration, with registry taking precedence. This dual-storage approach suggests:

  • Fallback mechanisms for different environments
  • Ability to persist settings across system changes

Summary of Malicious Findings

This binary is highly malicious with the following critical behaviors:

Primary Threat: System Restriction Malware

The binary manipulates Windows Group Policy registry keys to:

  • Disable the Run dialog (NoRun)
  • Restrict program execution (RestrictRun)
  • Hide/disable drives (NoDrives)
  • Prevent network operations (NoNetConnectDisconnect, NoEntireNetwork)
  • Disable system features (NoClose, NoRecentDocsHistory)

This behavior is characteristic of ransomware preparation, system lockers, or destructive malware that prevents users from:

  • Running recovery tools
  • Accessing safe mode
  • Using system utilities
  • Connecting to networks for help

Additional Malicious Capabilities:

  1. Dynamic API resolution - Evades static analysis
  2. Dual persistence - Registry + INI file storage
  3. Console manipulation - Hides output/errors
  4. File system operations - Can modify/delete files
  5. Memory manipulation - Can inject code or unpack payloads
  6. System fingerprinting - Profiles victim environment

文章来源: https://ddanchev.blogspot.com/2026/03/when-data-mining-conti-leaks-leads-to_029886864.html
如有侵权请联系:admin#unsafe.sh