Static task
static1
Behavioral task
behavioral1
Sample
iscsicli.exe
Resource
win10v2004-20231023-en
General
-
Target
iscsicli.exe
-
Size
43KB
-
MD5
121f5c538db58c3b3fccc7a0796a4c98
-
SHA1
d2cadc0eca0b8fbe2ee168f38fbe0296bd5627c8
-
SHA256
7d37289fb3a3e3fa6e4db399007bb037104df3299c2733f00490f67068e0b340
-
SHA512
f59f3fe1610548c1ef3028c9393a485a3a54a411789d2308aeae082c2b12fdcccc6817147d5117231ab9886030aa5ef7558fd55b6ee6a2e8bfd9d7ad4a159732
-
SSDEEP
768:DVwiJK3iS9LNZA0yOxev/gETthnJcb5Wprxt:hYXLNZAFOsv4ETtEWprxt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource iscsicli.exe
Files
-
iscsicli.exe.exe windows:10 windows x86
8ca0ab71d922d32950087f16fdc104a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
fgetws
feof
_wcstoui64
_XcptFilter
__p__commode
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
__p__fmode
vswprintf_s
__setusermatherr
_except_handler4_common
?terminate@@YAXXZ
_controlfp
memcpy
_wtoi
_vsnwprintf
__iob_func
_wcsicmp
_initterm
memset
api-ms-win-core-processenvironment-l1-1-0
GetStdHandle
GetCommandLineW
api-ms-win-core-file-l1-1-0
WriteFile
GetFileType
CreateFileW
api-ms-win-core-io-l1-1-0
DeviceIoControl
api-ms-win-core-localization-l1-2-0
FormatMessageW
SetThreadUILanguage
api-ms-win-shcore-obsolete-l1-1-0
CommandLineToArgvW
api-ms-win-core-file-l1-2-0
GetVolumePathNamesForVolumeNameW
GetVolumeNameForVolumeMountPointW
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
GetLastError
UnhandledExceptionFilter
ws2_32
WSACleanup
WSAStringToAddressA
WSAStartup
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-devices-config-l1-1-1
CM_Get_DevNode_Registry_PropertyW
api-ms-win-core-heap-l1-1-0
HeapSetInformation
api-ms-win-core-libraryloader-l1-2-0
LoadStringW
GetModuleHandleW
api-ms-win-core-console-l1-1-0
WriteConsoleW
api-ms-win-core-string-l1-1-0
WideCharToMultiByte
api-ms-win-core-windowserrorreporting-l1-1-3
RegisterApplicationRestart
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
GetCurrentThreadId
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
iscsidsc
AddIScsiSendTargetPortalW
GetIScsiSessionListW
ReportIScsiInitiatorListW
RemoveIScsiStaticTargetW
RefreshISNSServerW
RemoveIScsiConnection
ClearPersistentIScsiDevices
SetupPersistentIScsiVolumes
ReportIScsiPersistentLoginsW
SendScsiInquiry
AddISNSServerW
RemoveISNSServerW
RefreshIScsiSendTargetPortalW
SetIScsiIKEInfoW
LoginIScsiTargetW
SetIScsiInitiatorCHAPSharedSecret
GetDevicesForIScsiSessionW
AddIScsiStaticTargetW
RemoveIScsiPersistentTargetW
SendScsiReadCapacity
SetIScsiGroupPresharedKey
GetIScsiVersionInformation
ReportISNSServerListW
AddIScsiConnectionW
ReportIScsiSendTargetPortalsExW
RemovePersistentIScsiDeviceW
AddPersistentIScsiDeviceW
SetIScsiTunnelModeOuterAddressW
SendScsiReportLuns
ReportIScsiTargetsW
GetIScsiInitiatorNodeNameW
GetIScsiIKEInfoW
SetIScsiInitiatorNodeNameW
RemoveIScsiSendTargetPortalW
GetIScsiTargetInformationW
LogoutIScsiTarget
ReportPersistentIScsiDevicesW
ReportActiveIScsiTargetMappingsW
iscsium
DiscpEnumerateDeviceInterfaces
DiscpExecuteMethod
DiscpAllocMemory
DiscpSetRegistryValue
DiscpFreeDeviceInterfaceList
DiscpFreeMemory
DiscpTextAddrToBinary
api-ms-win-core-apiquery-l1-1-0
ApiSetQueryApiSetPresence
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ