Static task
static1
Behavioral task
behavioral1
Sample
MS16-032.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
MS16-032.exe
Resource
win10v2004-20230703-en
General
-
Target
MS16-032.exe
-
Size
75KB
-
MD5
beac6592dbd3a479a64789e43ec20f27
-
SHA1
9f70e05b14ab058d03fbb6f418b922c5177943bc
-
SHA256
f0b0e0548b218fb81940a4daf85c3709b2159bb357cab2f55576af3d75d47094
-
SHA512
0743dca27dd4372ab27bdd93abdd7e0022495c1abd1029f8b9f1f83dcf8c14cf75702a6342a51db265f2aaee92586f240beaccf3284ded89a965adc1040dc17f
-
SSDEEP
1536:Q/DI6Xpu0w+yZjuow7D92zXPkHT4mkcfob7hsWjcdU/elP:qVZuggu/D9eXccwobaU/a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource MS16-032.exe
Files
-
MS16-032.exe.exe windows x86
b0c742f785404243a3854fb05ee9e409
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DuplicateHandle
CreatePipe
CreateThread
IsWow64Process
GetProcAddress
GetLastError
GetModuleFileNameW
ReadFile
TerminateProcess
TerminateThread
GetCurrentThread
GetModuleHandleW
WaitForSingleObject
CloseHandle
GetCurrentProcess
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineW
GetStdHandle
WriteFile
GetProcessHeap
DeleteCriticalSection
HeapFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
HeapReAlloc
SetStdHandle
SetFilePointerEx
WriteConsoleW
RtlUnwind
HeapSize
LCMapStringW
GetStringTypeW
CreateFileW
advapi32
DuplicateTokenEx
LookupPrivilegeValueW
CreateProcessWithTokenW
PrivilegeCheck
CreateProcessAsUserW
GetTokenInformation
SetThreadToken
OpenThreadToken
CreateProcessWithLogonW
OpenProcessToken
AdjustTokenPrivileges
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ