Static task
static1
Behavioral task
behavioral1
Sample
PrintNightmare.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PrintNightmare.exe
Resource
win10v2004-20230220-en
General
-
Target
PrintNightmare.exe
-
Size
198KB
-
MD5
62685f24bfcbc717c7cc8a47d27afdd4
-
SHA1
d19def6e8629f94ceda94deaeefc7c1565a2038f
-
SHA256
ffd5e6912b028f34939455520b487174d2a4daa1261c6310da838adeb7fbe8b3
-
SHA512
d7eb1fa8686e257de46b09656d5ffa98b42d9e160134e58c04c9b8e4125757cf01d0e65b697584711c530b6edca79e5a635a9bead3c6446b33b30db1f3791bd8
-
SSDEEP
3072:6FZNynsQNfvWbURGY22/r45z02uewYyZuTKLHbe332+UUZUyz:69y7NfuwRNrK02ZbyZu/33tN
Malware Config
Signatures
Files
-
PrintNightmare.exe.exe windows x64
04ea918a5e088204783fc76c71d7e72a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleFileNameW
GetEnvironmentVariableW
lstrlenA
CreateFileW
Sleep
GetLastError
lstrcatW
DeleteFileW
HeapReAlloc
CloseHandle
HeapAlloc
FillConsoleOutputAttribute
GetProcAddress
LocalFree
ExitProcess
GetProcessHeap
GetModuleHandleW
lstrcpyW
SetConsoleCursorPosition
WriteConsoleW
SetFilePointerEx
RemoveDirectoryW
WriteFile
GetStdHandle
ReadConsoleW
ReadFile
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
lstrlenW
HeapFree
GetConsoleScreenBufferInfo
FillConsoleOutputCharacterA
CreateDirectoryW
LCMapStringW
CompareStringW
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
GetStringTypeW
RaiseException
user32
wsprintfW
advapi32
LookupAccountSidW
ConvertStringSidToSidW
shell32
ShellExecuteExW
rpcrt4
RpcStringBindingComposeW
RpcBindingFree
RpcStringFreeW
RpcBindingSetAuthInfoExW
NdrClientCall3
RpcBindingSetObject
RpcBindingFromStringBindingW
shlwapi
StrStrIW
PathAddBackslashW
PathRemoveFileSpecW
netapi32
NetShareDel
NetShareAdd
NetWkstaGetInfo
ws2_32
inet_addr
gethostbyname
ntohl
inet_pton
htonl
gethostname
inet_ntoa
WSAStartup
iphlpapi
IcmpSendEcho
IcmpCloseHandle
GetAdaptersInfo
IcmpCreateFile
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlIpv4AddressToStringW
RtlVirtualUnwind
RtlIpv4AddressToStringA
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ