Static task
static1
Behavioral task
behavioral1
Sample
TIBIAM~1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
TIBIAM~1.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
waefa.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
waefa.exe
Resource
win10v2004-20221111-en
General
-
Target
a8dd3a48eb0b910745c152eb6e85bcc904a6cd3d932d2252d5c5fc914357aa21
-
Size
13KB
-
MD5
c6ff1b01f7bfb196f268386f795d9802
-
SHA1
997bfeb4145b76902d7626937413d792d4ea954c
-
SHA256
a8dd3a48eb0b910745c152eb6e85bcc904a6cd3d932d2252d5c5fc914357aa21
-
SHA512
9535c36fc4ca468cc2beb596579ad3ebab986668f754f02f2086d38cd5647a4b3f060a2cbc1e4c95455a794f99edfd8ba6a38237ee0ef61500c9305fe92baf55
-
SSDEEP
384:+4UVwmXka1zhLtRMPRGDTaqpGhfRACVPCQwOpA:+4Cwm0yzhLMZGDTH2fRWXOi
Malware Config
Signatures
Files
-
a8dd3a48eb0b910745c152eb6e85bcc904a6cd3d932d2252d5c5fc914357aa21.cab
-
TIBIAM~1.EXE.exe windows x86
59d1f71c68944e3502b7711d1e7f642f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaVarVargNofree
__vbaFreeVar
__vbaLateIdCall
__vbaStrVarMove
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaPut4
_adj_fprem1
__vbaStrCat
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryDestruct
__vbaExitProc
__vbaOnError
__vbaObjSet
ord595
_adj_fdiv_m16i
_adj_fdivr_m16i
ord598
_CIsin
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaStrCmp
DllFunctionCall
_adj_fpatan
__vbaLateIdCallLd
__vbaRedim
EVENT_SINK_Release
__vbaUI1I2
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
__vbaStrVarVal
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaNew2
__vbaR8Str
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord578
ord100
__vbaAryLock
__vbaStrToAnsi
__vbaVarDup
__vbaVarCopy
_CIatan
__vbaStrMove
ord650
_allmul
__vbaLateIdSt
_CItan
__vbaAryUnlock
_CIexp
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
waefa.exe.exe windows x86
f2fb3b44e056ec201734eb4ac314679c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
wsock32
htons
inet_addr
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateRemoteThread
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetCurrentProcess
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetVersionExA
OpenProcess
ReadProcessMemory
SetUnhandledExceptionFilter
Sleep
VirtualAllocEx
VirtualFreeEx
WaitForSingleObject
WriteProcessMemory
msvcrt
_itoa
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_flsbuf
_iob
_onexit
_setmode
abort
atexit
atoi
free
malloc
memcpy
memset
signal
strcat
strcmp
strcpy
shell32
SHGetSpecialFolderPathA
ShellExecuteA
user32
FindWindowA
GetWindowThreadProcessId
LoadStringA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 688B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE