C:\rafabeyate hovaniyifet\wi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
af23b6f887c0a5dc113975b9146d7eb8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af23b6f887c0a5dc113975b9146d7eb8.exe
Resource
win10v2004-20240226-en
General
-
Target
af23b6f887c0a5dc113975b9146d7eb8
-
Size
336KB
-
MD5
af23b6f887c0a5dc113975b9146d7eb8
-
SHA1
f990aa910df5b9b436c77cf3cb2d97f60326b0cc
-
SHA256
92ce8e6c8d402c9f1b5974f66480724aa42f01a700f3a3ca882df2e764a62468
-
SHA512
7222251d8f69f099ad35fd002eb1db631b80b050d0179b58bfdca6c5973e26053d6f9bc3e8efea15ad8e0b7b0264c184722b1db0bd9dc4b62071c4e3310efc93
-
SSDEEP
6144:wpr9Xriv4b1Kq6QB30+8BE9/ZtulCd135i0BPAnpQx5AH:c9Xr3b1SKn/ZtuC1JPBPAi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource af23b6f887c0a5dc113975b9146d7eb8
Files
-
af23b6f887c0a5dc113975b9146d7eb8.exe windows:5 windows x86 arch:x86
bdfe864648d15cefe0f63966ed6f7e99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasA
InterlockedPopEntrySList
GetConsoleDisplayMode
CreateConsoleScreenBuffer
GetConsoleCP
VerifyVersionInfoA
WaitNamedPipeW
CreateMutexA
WriteConsoleA
SetLastError
CreateFileW
WritePrivateProfileSectionW
GetPrivateProfileSectionW
EnumDateFormatsExA
GetCurrentProcessId
LoadLibraryA
IsDebuggerPresent
SetConsoleCP
FindFirstVolumeA
WriteFile
BuildCommDCBA
VerLanguageNameA
AreFileApisANSI
WriteProcessMemory
ResetEvent
GetExitCodeThread
EndUpdateResourceA
GetCPInfo
UpdateResourceA
SetConsoleTitleW
SetFilePointer
LoadLibraryExA
CopyFileW
ReadConsoleA
ActivateActCtx
AddRefActCtx
CreateActCtxW
DnsHostnameToComputerNameA
ReadConsoleOutputW
GetProcessHeaps
GetSystemWindowsDirectoryW
GetUserDefaultLCID
BuildCommDCBAndTimeoutsA
HeapAlloc
FlushViewOfFile
GetAtomNameA
GlobalSize
HeapSize
GetGeoInfoA
GetCurrentProcess
VirtualProtect
GetProcAddress
GetModuleHandleA
CreateThread
GetVersionExA
SetProcessAffinityMask
WaitForSingleObject
SetSystemPowerState
VerifyVersionInfoW
WriteConsoleOutputCharacterW
SetTimeZoneInformation
GetMailslotInfo
GetCPInfoExA
SetEnvironmentVariableA
GetFileAttributesExA
GetComputerNameW
CommConfigDialogW
GetConsoleWindow
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
CreateFileA
GetConsoleAliasesLengthA
HeapLock
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
GetLastError
HeapFree
TerminateProcess
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
ExitProcess
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetStdHandle
LCMapStringA
LCMapStringW
GetConsoleMode
FlushFileBuffers
CloseHandle
GetConsoleOutputCP
WriteConsoleW
user32
RealChildWindowFromPoint
GetAltTabInfoW
advapi32
AdjustTokenPrivileges
BackupEventLogA
Sections
.text Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ