Static task
static1
Behavioral task
behavioral1
Sample
pafish64.exe
Resource
win10v2004-20240226-en
General
-
Target
pafish64.exe
-
Size
118KB
-
MD5
8e442bacabdc96c4b04b5da1af436665
-
SHA1
d64b5ca1b9e1ee08db50572ad238c0711912ad45
-
SHA256
d828731d1013f7b1c690a5f437994ceec71297b3191afebd7c12690a745690a8
-
SHA512
de00d30fbda950c821fa6e03417520757aa0c9ee3e14805b8fb51369e315e9c88e54281482a1a57b6fbcb5722c75edb5cf0e744e2b5005ab75a4a38f5547fd78
-
SSDEEP
3072:wgjIzC10pKQ6PbNehdv3I0lmPendNyrOMGTkrNRDh:wgSCuMDendVMGTuNRV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource pafish64.exe
Files
-
pafish64.exe.exe windows:4 windows x64 arch:x64
Password: infected
6b8cf599a34a9fd7f0f7abd7b1490e9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
iphlpapi
GetAdaptersAddresses
kernel32
CloseHandle
CreateFileA
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
EnterCriticalSection
GetConsoleScreenBufferInfo
GetConsoleWindow
GetCurrentProcess
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GlobalMemoryStatusEx
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
Process32First
Process32Next
SetConsoleTextAttribute
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
lstrcmpiA
mpr
WNetGetProviderNameA
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_commode
_errno
_fmode
_initterm
_lock
_onexit
_unlock
abort
calloc
exit
fclose
fopen
fprintf
fputc
fputs
free
fwrite
getchar
localeconv
malloc
mbstowcs
memcmp
memcpy
memset
rand
signal
srand
strerror
strlen
strncat
strncmp
strncpy
strstr
toupper
vfprintf
wcslen
wcsstr
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoUninitialize
oleaut32
SysAllocString
SysFreeString
user32
CallNextHookEx
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageA
FindWindowA
GetClientRect
GetCursorPos
GetDoubleClickTime
GetMessageA
GetSysColorBrush
GetSystemMetrics
GetWindowRect
KillTimer
LoadCursorA
MessageBeep
PostMessageA
PostQuitMessage
RegisterClassW
SetTimer
SetWindowsHookExA
ShowWindow
TranslateMessage
UnhookWindowsHookEx
ws2_32
freeaddrinfo
getaddrinfo
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE