D:\Visual_Studio_Kody\Patcher\Nerwia\Release\Nerwiatest_patcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ad3f65e32f640367ae1f10d76a53fa13.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad3f65e32f640367ae1f10d76a53fa13.exe
Resource
win10v2004-20240226-en
General
-
Target
ad3f65e32f640367ae1f10d76a53fa13
-
Size
1.6MB
-
MD5
ad3f65e32f640367ae1f10d76a53fa13
-
SHA1
0314cd6e5d40a6fd1050af4d04e66b2dd2f7b035
-
SHA256
2b7a4d0b768c6993614ed56a3b69fca11496b0e26d8488ca1e5da298dc5c498d
-
SHA512
43244d3ff9e597f56641a5a32104e62fece44495005a3b1d269c9fd87dd6557aab4641b074e2cac6baafa11a6678b17c8bc3c4800376116d2ff76f3607fe102f
-
SSDEEP
49152:70YKXcGvRw38AeJbji2VZGE52tgF01E8LWlYp6:70Y4tRQ8AqzWE52tgAdWm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad3f65e32f640367ae1f10d76a53fa13
Files
-
ad3f65e32f640367ae1f10d76a53fa13.exe windows:5 windows x86 arch:x86
b3ab73e762ca16b734fe7970e08fa462
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dwmapi
DwmExtendFrameIntoClientArea
d2d1
ord1
dwrite
DWriteCreateFactory
kernel32
GetFileAttributesA
DeleteFileA
SetFileAttributesA
GetModuleFileNameA
GetModuleFileNameW
FindNextFileA
FindClose
MultiByteToWideChar
FileTimeToSystemTime
WideCharToMultiByte
SystemTimeToTzSpecificLocalTime
SizeofResource
LockResource
LoadResource
FindResourceW
HeapSetInformation
GetFileSizeEx
SetFileTime
CreateMutexW
ReleaseMutex
Sleep
FormatMessageW
GetLastError
LocalFree
CreateProcessW
OpenMutexW
GetFileTime
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryW
FreeLibrary
GetModuleHandleW
MapViewOfFile
LoadLibraryW
QueryPerformanceCounter
GetTickCount
MoveFileExW
GlobalFree
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
GetEnvironmentVariableA
VerSetConditionMask
VerifyVersionInfoW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
VirtualAlloc
GetVersionExW
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SignalObjectAndWait
CreateFileMappingW
GetFileSize
GetSystemInfo
CloseHandle
UnmapViewOfFile
CreateFileW
WaitForSingleObjectEx
GlobalAlloc
DeleteFileW
WriteConsoleW
HeapSize
GetProcAddress
SetEvent
CreateTimerQueue
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
InitializeSListHead
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
GetExitCodeThread
GetCurrentThread
IsValidCodePage
FindFirstFileExA
GetTimeZoneInformation
SetEndOfFile
FlushFileBuffers
HeapReAlloc
SetStdHandle
GetTimeFormatW
GetDateFormatW
GetFullPathNameW
GetCurrentDirectoryW
HeapAlloc
HeapFree
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
WriteFile
ExitProcess
SetFilePointerEx
GetModuleHandleExW
ExitThread
GetFileAttributesExW
GetDriveTypeW
CreateDirectoryW
RaiseException
TryEnterCriticalSection
GetCurrentThreadId
GetStringTypeW
DuplicateHandle
GetCurrentProcess
SwitchToThread
RtlUnwind
user32
CreateWindowExW
ShowWindow
DefWindowProcW
GetWindowLongW
InvalidateRect
SetFocus
SetWindowLongW
GetClientRect
UpdateWindow
MessageBoxW
RegisterClassExW
DestroyWindow
GetCursorPos
GetMessageW
GetSystemMetrics
GetCapture
DispatchMessageW
ValidateRect
SetLayeredWindowAttributes
TranslateMessage
LoadCursorW
SetCapture
PostQuitMessage
ReleaseCapture
GetWindowRect
SetWindowPos
advapi32
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
shell32
ShellExecuteW
ole32
CoInitialize
CoGetClassObject
CoUninitialize
CoCreateInstance
OleSetContainedObject
OleInitialize
oleaut32
VariantClear
SysAllocString
VariantInit
wldap32
ord145
ord219
ord46
ord14
ord216
ord208
ord41
ord117
ord26
ord27
ord127
ord167
ord142
ord79
ord133
ord147
ord301
ws2_32
gethostname
sendto
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
closesocket
getsockopt
getsockname
getpeername
connect
bind
WSAGetLastError
send
recv
htons
Sections
.text Size: 563KB - Virtual size: 562KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 904KB - Virtual size: 904KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ