C:\ICF_AutoCapsule_disabled\source-dir\sts-pj\win_installer_R52\Windows\STS_Manager\Release\splogremove.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-20_3b06af95dd70b3d1f32a7dc615caac5f_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-20_3b06af95dd70b3d1f32a7dc615caac5f_karagany_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-20_3b06af95dd70b3d1f32a7dc615caac5f_karagany_mafia
-
Size
152KB
-
MD5
3b06af95dd70b3d1f32a7dc615caac5f
-
SHA1
40ab26651eed63b46be6ccd9773d355de9cc6921
-
SHA256
e19b8ca5f6659b2c8b9ec4831a25df208007b1d81f095f1eb6b3dbbbf217ce67
-
SHA512
696b64071ba28321db2529fca56140dfb69efbef517adca1a19790e78633aba6bcdcc1a5dab713b800692f83bfa09fd0b3085f36b8507985e1798796868e5600
-
SSDEEP
3072:FbPwda0ekEQx1507VizCaMAYs8W5aKnBlRtZ:Fbet15sWCaQ05pB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-20_3b06af95dd70b3d1f32a7dc615caac5f_karagany_mafia
Files
-
2024-03-20_3b06af95dd70b3d1f32a7dc615caac5f_karagany_mafia.exe windows:5 windows x86 arch:x86
dde5fb66a794245aae3cc54e9a327b6e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSAStartup
WSACleanup
gethostname
kernel32
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentThreadId
EnterCriticalSection
CompareFileTime
SetEndOfFile
FindNextFileA
GetLastError
GetCompressedFileSizeA
FindFirstFileA
SetUnhandledExceptionFilter
GetProcessHeap
CreateFileW
FindClose
TlsFree
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapFree
DeleteFileA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCommandLineA
HeapSetInformation
InitializeCriticalSectionAndSpinCount
FatalAppExitA
EncodePointer
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
CompareStringW
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameW
SetHandleCount
GetFileType
GetStartupInfoW
Sleep
HeapAlloc
WideCharToMultiByte
GetTimeZoneInformation
RtlUnwind
CloseHandle
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapCreate
HeapDestroy
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapSize
HeapReAlloc
CreateFileA
SetStdHandle
LCMapStringW
MultiByteToWideChar
GetStringTypeW
WriteConsoleW
SetFilePointer
ReadFile
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ