Static task
static1
Behavioral task
behavioral1
Sample
wims.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
wims.exe
Resource
win10v2004-20230220-en
General
-
Target
wims.exe
-
Size
45KB
-
MD5
2131a626571c9e85eedc9e7700e3a781
-
SHA1
098f62a36f44d2fdf8ab154dbb550a35bae72608
-
SHA256
4fd6a29887e2d83a3201865ca128a4146e934dcc7313f0a3a1a9993ef8583e00
-
SHA512
d1a24c7d5761aa1d9f4b28e834e90ae25d38b01f994da61422d6bbd1a35c9f3a6df8741b442f984072a896d8de60525324f733989acd45973d8ff10d33d7e57d
-
SSDEEP
768:2sXQsgNDEGR1PL9ato3eilisl40XgveGaCv0oAh:P1gNnR1PL9YoOkl40XgvtagfAh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource wims.exe
Files
-
wims.exe.exe windows x86
5916579399eb67d9b3c360d074412c1e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pbvm100
ord67
kernel32
VirtualFree
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetCommandLineW
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ