Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded.exe
Resource
win10v2004-20230831-en
General
-
Target
CVE-2018-8120x86.exe
-
Size
44KB
-
MD5
930615fa8da0d2230ded37651813e5fe
-
SHA1
7a83298cabe539b7dc16114e902816d05dba9363
-
SHA256
8c7c07fa9e9fed0901f9b5d0f45b54e79db86bf7a9c9dba493372a23579ea58e
-
SHA512
812a55be32fe7159ef2ec61c0db4465229c2c369ac409affcb263c1361ec69edf43c354fb1578555916c928875a779ec60390bd3a0530117777384eec106630f
-
SSDEEP
768:NUBlCtlyZMvCMEdjwbde1CmRXIcfI2IkZPmd69A0Wlkr7iXc0zK4fFJf8SvERbQ:NUBgry2vC5djwW/IYIu4EMkiXtzJf8YP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded/framework/data/exploits/CVE-2018-8120/CVE-2018-8120x86.exe
Files
-
CVE-2018-8120x86.exe.zip
Password: S@ndb0x!2023@@
-
Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded/framework/data/exploits/CVE-2018-8120/CVE-2018-8120x86.exe.exe windows x86
Password: S@ndb0x!2023@@
7f11c7de3f90c26a3918006ee15da6ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
ReadFile
GetStartupInfoW
GetLastError
GetProcAddress
CreatePipe
GetCurrentProcess
CloseHandle
lstrcpyW
GetStringTypeW
CreateProcessW
GetCommandLineW
LoadLibraryExA
ExitProcess
LCMapStringW
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
EncodePointer
DecodePointer
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetModuleFileNameW
DeleteCriticalSection
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetFileType
SetLastError
GetCurrentThreadId
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
HeapReAlloc
SetStdHandle
SetFilePointerEx
WriteConsoleW
RtlUnwind
HeapSize
CreateFileW
user32
CreateWindowStationW
SetProcessWindowStation
gdi32
SetBitmapBits
CreateBitmap
GetBitmapBits
shell32
CommandLineToArgvW
psapi
EnumDeviceDrivers
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
manifest.json