C:\Users\timwhite\Desktop\CVE-2018-8639-EXP\CVE-2018-8639-EXP\x64\Debug\CVE-2018-8639-EXP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
LPE_ALL.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
LPE_ALL.exe
Resource
win10v2004-20240508-en
General
-
Target
LPE_ALL.exe
-
Size
1.2MB
-
MD5
fc36ebc7382bec2df0e88995a1cec452
-
SHA1
9eb15ec22bbb579f04c59724f09487b6e5b22034
-
SHA256
38754abb186abcbde27381e5fe69a510152311dcfffd9afa192a4fc9ec56e9e4
-
SHA512
ff4597357559d3f9cf4fff709becc9935e6a47d54e83f641fa75965c5b5aef199060643b1de396a9bf7f6ef3b8f6cea1a569bb9fee791094e79c2fa4aae3858b
-
SSDEEP
12288:Er/7+R/dYRdLh2ujJmix5l2LoB0QCc0DiXhjgVBjvb9cUZt5D/:o61dYjh2ujl72LoVv3gVBJ5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource LPE_ALL.exe
Files
-
LPE_ALL.exe.exe windows:6 windows x64 arch:x64
a5b8572997ccada7d65a9861acf89920
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
SetThreadDesktop
SetClassLongPtrA
DestroyAcceleratorTable
CreateAcceleratorTableW
DestroyWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
CloseDesktop
CreateDesktopA
gdi32
GetPaletteEntries
DeleteObject
DeleteDC
CreatePalette
CreateCompatibleDC
SetPaletteEntries
kernel32
GetConsoleCP
GetConsoleMode
HeapQueryInformation
HeapReAlloc
GetFileSizeEx
SetFilePointerEx
ReadFile
ReadConsoleW
CreateFileW
FlushFileBuffers
LeaveCriticalSection
GetCurrentProcess
GetCurrentProcessId
ExitProcess
CreateProcessA
SetPriorityClass
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetStringTypeW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThreadId
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
GetModuleHandleW
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
SetLastError
EnterCriticalSection
RtlUnwind
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
RtlPcToFileHeader
GetModuleHandleExW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapSize
HeapValidate
GetSystemInfo
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetCurrentThread
CloseHandle
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
OutputDebugStringW
WriteConsoleW
SetConsoleCtrlHandler
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
Sections
.textbss Size: - Virtual size: 397KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 848KB - Virtual size: 848KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 199KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 350KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 437B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 67KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ