Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded.exe
Resource
win10v2004-20230831-en
General
-
Target
CVE-2018-8453.exe
-
Size
45KB
-
MD5
bce8fb92217475d309d40fb8c6c980a0
-
SHA1
e3015fbfa6be1d4348f17e99f668c7dd69c75d6d
-
SHA256
b3d48c1a812e946a122d09eb441642fd3e885980ab6afe36c0f2162fd21674d9
-
SHA512
41af715f9de9b249e9d108d49668b311f2c5c65be7a68f044a713bd98468ba4ad0c2d2dc5da805d1334ea692dbe6eb37375dd4c84854678286cd706753bf7a75
-
SSDEEP
768:NX4QXFTeZJmV8CSHuCA9DHrA//TZTKdmmctvnUBSPGsG6WA2mP7b2YkhBy+IQnPN:NX4QX+JmVguCA9DHrw/5KMZ6KGDbA2hJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded/framework/data/exploits/CVE-2018-8453/CVE-2018-8453.exe
Files
-
CVE-2018-8453.exe.zip
Password: S@ndb0x!2023@@
-
Device/HarddiskVolume3/$Recycle.Bin/S-1-5-21-1159581898-2029943322-2268025737-2727/$RNC412D/embedded/framework/data/exploits/CVE-2018-8453/CVE-2018-8453.exe.exe windows x86
Password: S@ndb0x!2023@@
146e62ff1b0dc09ded6b9415ee07feb9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetModuleHandleW
GetModuleHandleA
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
CreateProcessW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
Sleep
GetCurrentProcessId
FreeLibrary
GetProcAddress
LoadLibraryA
ReadConsoleW
K32EnumDeviceDrivers
HeapAlloc
GetLastError
HeapFree
GetCommandLineW
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetModuleFileNameW
GetProcessHeap
SetLastError
GetCurrentThreadId
GetFileType
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EnterCriticalSection
LeaveCriticalSection
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
GetStringTypeW
RtlUnwind
HeapSize
HeapReAlloc
LCMapStringW
CreateFileW
user32
UpdateWindow
ShowWindow
SetScrollPos
SetScrollRange
RegisterClassExW
DefWindowProcW
CreateWindowExW
SetCapture
DestroyWindow
SendMessageW
DestroyAcceleratorTable
CreateAcceleratorTableW
gdi32
DeleteObject
CreateCompatibleDC
CreatePalette
SetPaletteEntries
GetPaletteEntries
DeleteDC
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
manifest.json