wabmig.pdb
Static task
static1
Behavioral task
behavioral1
Sample
wabmig.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
wabmig.exe
Resource
win10v2004-20240419-en
General
-
Target
wabmig.exe
-
Size
66KB
-
MD5
e43099308add8c0db51cd6a21f7f7126
-
SHA1
bf56402b38b6badb74126282af8e6db54af02ec0
-
SHA256
4826a7ac5cf4d2f4225553f97605c87882eab36ca6de0910a0436a59d3bee739
-
SHA512
beb718b323ffe8efbc361e65d0f967c0b5af58d9fb04ce59d7db8987f7c8cfba0aa79ae4a518df4071864c1ecc9c60a539df75f86257a6888db4b8f6f055c512
-
SSDEEP
768:W8SghDdzeTIwm8SQ9qlXU+rfc51X99VwhCnQeTF4Fs5p4+2KW0s20UiV:W8SeDZJ9XUMcvxRQeTF4A3WBVUc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource wabmig.exe
Files
-
wabmig.exe.exe windows:6 windows x64 arch:x64
3db652d7758f14adbcc91cbe7e38e07b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExA
RegQueryInfoKeyA
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegQueryValueExA
kernel32
GetProcAddress
LoadLibraryA
FreeLibrary
GetCommandLineW
ExpandEnvironmentStringsA
FormatMessageA
WideCharToMultiByte
GetFileAttributesA
GetACP
MultiByteToWideChar
LocalAlloc
HeapSetInformation
LocalFree
ExpandEnvironmentStringsW
GetLastError
CloseHandle
CreateThread
RegisterApplicationRestart
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
CompareStringOrdinal
user32
DispatchMessageA
IsDlgButtonChecked
PeekMessageA
SendMessageW
MessageBoxW
SetDlgItemTextW
SetDlgItemTextA
GetWindowLongPtrA
DialogBoxParamW
IsWindowEnabled
SendMessageA
GetDlgItem
EndDialog
DefWindowProcA
LoadStringW
ShowWindow
SetWindowLongPtrA
TranslateMessage
PostMessageA
LoadStringA
EnableWindow
msvcrt
toupper
_XcptFilter
_strnicmp
memset
_amsg_exit
__getmainargs
__set_app_type
?terminate@@YAXXZ
_commode
_fmode
_acmdln
__C_specific_handler
_initterm
__setusermatherr
_ismbblead
_cexit
_exit
exit
comctl32
ord17
ntdll
RtlCaptureContext
WinSqmSetDWORD
RtlLookupFunctionEntry
RtlVirtualUnwind
WinSqmAddToStream
shell32
CommandLineToArgvW
shlwapi
PathAppendA
StrCmpW
SHQueryValueExA
PathFindFileNameA
PathRemoveFileSpecA
ord487
ole32
CoCreateInstance
CoWaitForMultipleHandles
CoInitializeEx
CoUninitialize
CoInitialize
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ