C:\Users\snill\Desktop\woofer_source\x64\Release\Athena.pub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8b48db6e3f8e834f14d4a03dd5b84a33.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8b48db6e3f8e834f14d4a03dd5b84a33.exe
Resource
win10v2004-20231222-en
General
-
Target
8b48db6e3f8e834f14d4a03dd5b84a33
-
Size
3.7MB
-
MD5
8b48db6e3f8e834f14d4a03dd5b84a33
-
SHA1
c021554c6cfb82781d5183c268fa35d8e2ec6b5d
-
SHA256
d8c7d5be8d47ca64ff1ef8caa1c4e955b37feb2a84d1c83f2b6a3fbc3930a9f8
-
SHA512
8600a1de85742897b01dc948a024636a827f2414802ea42e8c4f4a35daf5a398a61b66817e974bd8ca791020dd324ffc38c886bcc1d06cab2bd4c2c6416b08e2
-
SSDEEP
49152:eGtlqsUIU6i6ZPjsMVoQcCF1txjX03W5kmoE1e0wFFv8SEA4be5mUmURHSUiPNlU:7+6ZptxjXeI+j5H5Lbtilx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b48db6e3f8e834f14d4a03dd5b84a33
Files
-
8b48db6e3f8e834f14d4a03dd5b84a33.exe windows:6 windows x64 arch:x64
20155d92c7a93f20ca745eae07729f53
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSASetLastError
select
__WSAFDIsSet
inet_pton
shutdown
WSAGetLastError
getnameinfo
gethostname
sendto
recvfrom
ntohl
freeaddrinfo
getaddrinfo
ioctlsocket
listen
htonl
socket
send
recv
closesocket
accept
WSACleanup
WSAStartup
WSAIoctl
setsockopt
wldap32
ord211
ord46
ord60
ord45
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord301
ord35
ord143
ord200
ord30
ord79
crypt32
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertFreeCertificateContext
CertOpenStore
CryptStringToBinaryA
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertAddCertificateContextToStore
advapi32
CryptReleaseContext
GetLengthSid
OpenProcessToken
IsValidSid
CopySid
ConvertSidToStringSidA
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptAcquireContextA
GetTokenInformation
kernel32
GetSystemInfo
WriteConsoleW
GetModuleFileNameW
VirtualProtect
VirtualQuery
ExitProcess
CreateThread
ExitThread
FreeLibraryAndExitThread
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetFilePointerEx
SetConsoleCtrlHandler
GetConsoleOutputCP
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetTimeZoneInformation
DeleteFileW
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
GlobalAlloc
GlobalFree
GlobalLock
WideCharToMultiByte
GlobalUnlock
GetModuleHandleA
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
VerSetConditionMask
VerifyVersionInfoW
QueryPerformanceCounter
GetModuleFileNameA
Process32First
HeapFree
GetCurrentProcess
InitializeCriticalSectionEx
HeapSize
CreateToolhelp32Snapshot
Sleep
GetLastError
CreateFileA
Process32Next
HeapReAlloc
CloseHandle
GetEnvironmentStringsW
HeapAlloc
DecodePointer
HeapDestroy
Beep
LocalFree
DeleteCriticalSection
GetProcessHeap
AllocConsole
IsDebuggerPresent
SetLastError
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
GetSystemDirectoryA
FreeLibrary
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
GetFileSizeEx
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
RtlVirtualUnwind
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
FormatMessageW
WriteFile
GetModuleHandleW
GetCurrentProcessId
GetSystemTimeAsFileTime
SwitchToFiber
DeleteFiber
CreateFiber
LoadLibraryW
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
LCMapStringEx
EncodePointer
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
ResetEvent
SetEvent
GetStringTypeW
GetCPInfo
OutputDebugStringW
RtlUnwindEx
VirtualAlloc
LoadLibraryExW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
RaiseException
RtlPcToFileHeader
InterlockedPushEntrySList
RtlUnwind
user32
TranslateMessage
PeekMessageA
PostQuitMessage
MessageBoxA
GetWindowRect
DispatchMessageA
GetProcessWindowStation
GetDesktopWindow
FindWindowA
UpdateWindow
GetWindowLongW
AdjustWindowRectEx
GetKeyState
LoadCursorA
DestroyWindow
GetDC
SetWindowPos
MonitorFromWindow
EnumDisplayMonitors
ScreenToClient
SetWindowTextW
WindowFromPoint
ShowWindow
GetUserObjectInformationW
SetWindowLongA
ClientToScreen
IsChild
GetMonitorInfoA
GetForegroundWindow
DefWindowProcA
CreateWindowExA
SetLayeredWindowAttributes
SetFocus
BringWindowToTop
SetCapture
SetCursor
SetWindowLongW
GetClientRect
UnregisterClassA
RegisterClassExA
ReleaseCapture
SetForegroundWindow
IsIconic
SetCursorPos
ReleaseDC
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
MessageBoxW
GetCapture
gdi32
GetDeviceCaps
shell32
ShellExecuteA
xinput1_4
ord4
ord2
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
d3d9
Direct3DCreate9
bcrypt
BCryptGenRandom
userenv
UnloadUserProfile
rpcrt4
RpcStringFreeA
UuidCreate
UuidToStringA
urlmon
URLDownloadToFileA
Sections
.text Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 880KB - Virtual size: 879KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ