C:\COCKPIT42\Jetro COCKPIT Client\Source Control\JDsCockpit-branch- 4.2.0.20\Bin\AsUserFromService.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_e722365acd34f51d1cfa341acaa1c414_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_e722365acd34f51d1cfa341acaa1c414_karagany_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-23_e722365acd34f51d1cfa341acaa1c414_karagany_mafia
-
Size
136KB
-
MD5
e722365acd34f51d1cfa341acaa1c414
-
SHA1
4c0c70e852317e3e3cb8ac10b1d1bdf11fedd3e1
-
SHA256
6ad926683b2a07d36c871a320546b08a22c7c54a2f90761e8ef48fa1ce3c35de
-
SHA512
7e985fcfa1d4370dc8d601e550b7d48500933431a3d2350da7cd0213db87eff075fee308ba0e2c229e494ba6cdd22ecf1b62615a9ef44f60ffabbe5ad5edfec8
-
SSDEEP
3072:r/TTceYjAOQcF89faz7RU/ynT+54vxtPeJEkue4:r/ceY/QcF89fyRGe6ud+EFZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-23_e722365acd34f51d1cfa341acaa1c414_karagany_mafia
Files
-
2024-04-23_e722365acd34f51d1cfa341acaa1c414_karagany_mafia.exe windows:5 windows x86 arch:x86
e9ca623ecb3ac60210a3214fe7c730c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LockResource
CreateProcessW
WideCharToMultiByte
Sleep
TerminateProcess
GetLastError
CloseHandle
FreeLibrary
LoadLibraryW
GetProcAddress
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SizeofResource
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetStdHandle
WriteConsoleW
CreateFileW
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InterlockedCompareExchange
InitializeCriticalSection
OutputDebugStringW
LoadResource
FindResourceW
InterlockedExchange
FindResourceExW
user32
MessageBoxW
userenv
CreateEnvironmentBlock
advapi32
GetUserNameW
CreateProcessAsUserW
DuplicateTokenEx
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ