Here is another interesting case. Spawn a child process, reprogram its EIP with an XORd shellcode. Utilize Cobalt Strike beacon_x64.dll. Thx to @MalwareRE for RE assistance 🙏
📎virustotal.com/gui/file/386d0…
Not sure if this implant wants to be an XLL (no xlAutoOpen), or WLL (no wdAutoOpen), but it splits the difference with a wlAutoOpen 🤷♂️
Sometimes things stand out because of what they are not doing. This .XLL doesn't do any useful work. What's it doing? Anti-analysis domain check, FNV API hash resolution, and Cobalt Strike shellcode. Thx to the mighty @MalwareRE for help!
📎virustotal.com/gui/file/99195…
"The best way to show that a stick is crooked is not to argue about it or to spend time denouncing it, but to lay a straight stick alongside it"
― D.L. Moody
Pacific Northwest: If you look closely at this panoramic view of Gold Creek Valley (Cascades in WA state), notice the downed trees at left and the bare mountainside with waterfalls at right.
In 2007 there was a massive avalanche on the right side. The force was so strong it carried across Gold Creek and up the left side of the valley causing the trees to fall UPHILL.
Aside, when you’re hiking along the side of a mountain and periodically exit the forest for some open bouldery views and then re-enter the forest, that open area was likely caused by an avalanche. They’re called avalanche chutes.