Static task
static1
Behavioral task
behavioral1
Sample
wordpad.exe
Resource
win10-20230915-en
General
-
Target
wordpad.exe
-
Size
169KB
-
MD5
24d39b81ea352a351d7e427be758ef4c
-
SHA1
b336c1e18438718d9e33e3f0e9b5e4706f660118
-
SHA256
d3f7d78eb44521d4789b4138499ac44cf3bb26ea7dcebb4a77f12bd46b8f9bbd
-
SHA512
0d0990bfc0d19d09d7d97aa4f950965aa1c055324ab431eb85ce2fec2cf3342ab36c1b3aa344ff9eccd9040bf467a6c058538fdfab917011cddda16ab0da35c8
-
SSDEEP
3072:UlfyfIdPy6sP8dEaqOnaJ2buVK346p0QFL9hVZ8kGYV/:UlKQVdEaTnaJ2b2GPX/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource wordpad.exe
Files
-
wordpad.exe.exe windows x64
0a12397023bc8f1d9358e8c58aed7662
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateProcessA
CreateDirectoryA
ReadFile
PeekNamedPipe
WaitForSingleObject
GetModuleFileNameA
GetOEMCP
GetModuleHandleA
GetACP
GetVersionExA
GetProcAddress
GetCurrentProcessId
GetComputerNameA
VirtualFree
VirtualAlloc
SystemTimeToTzSpecificLocalTime
LoadLibraryA
FreeLibrary
SetEndOfFile
RemoveDirectoryA
GetStartupInfoA
Process32FirstW
DeleteFileA
FileTimeToSystemTime
CreateFileA
Process32NextW
GetFileAttributesA
GetLastError
CopyFileA
Sleep
ProcessIdToSessionId
CreateToolhelp32Snapshot
SetCurrentDirectoryA
OpenProcess
GetCurrentDirectoryA
FindClose
GetFullPathNameA
CreatePipe
FindNextFileA
TerminateProcess
GetCurrentProcess
FindFirstFileA
HeapReAlloc
HeapSize
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
CreateFileW
GetProcessHeap
SetStdHandle
GetFileSizeEx
MoveFileA
GetLogicalDrives
ExitProcess
GetLocalTime
CloseHandle
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
IsValidCodePage
FindFirstFileExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
GetModuleHandleExW
GetStdHandle
WriteFile
WideCharToMultiByte
HeapAlloc
LCMapStringW
HeapFree
GetFileType
GetConsoleCP
GetConsoleMode
GetStringTypeW
ReadConsoleW
advapi32
FreeSid
CryptGetHashParam
CryptImportKey
CryptSetKeyParam
OpenProcessToken
CryptDestroyHash
CryptSetHashParam
RevertToSelf
ImpersonateLoggedOnUser
LookupAccountSidA
DuplicateTokenEx
GetTokenInformation
AllocateAndInitializeSid
GetUserNameA
CryptReleaseContext
CheckTokenMembership
CryptDestroyKey
CryptAcquireContextW
CryptEncrypt
CryptDecrypt
CryptCreateHash
CryptHashData
wininet
InternetQueryOptionW
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
InternetSetOptionW
InternetReadFile
crypt32
CryptBinaryToStringA
CertFreeCertificateChain
CertGetCertificateContextProperty
CryptDecodeObjectEx
CryptImportPublicKeyInfo
CryptStringToBinaryA
ws2_32
htonl
ntohl
htons
WSAStartup
WSASocketW
closesocket
WSAIoctl
WSACleanup
ntohs
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ