wab.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d66a4cc1545f58f91d01c81dcac09577642b9f5a93ac38c567870c02c5783dd9.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d66a4cc1545f58f91d01c81dcac09577642b9f5a93ac38c567870c02c5783dd9.exe
Resource
win10v2004-20240508-en
General
-
Target
d66a4cc1545f58f91d01c81dcac09577642b9f5a93ac38c567870c02c5783dd9
-
Size
531KB
-
MD5
1fcc0c085a0f9a7b9d130f9e9a7c508e
-
SHA1
3b096425d6ff3c7f815358ed99bc6775080b1060
-
SHA256
d66a4cc1545f58f91d01c81dcac09577642b9f5a93ac38c567870c02c5783dd9
-
SHA512
0d0262906100df8e99d328beffe34430d16c2e02cf6de8bfc2e94337a7962c8c4441b4c4eef63339f9bb781fb6859013918be877ee03f05f414fbb763e67136e
-
SSDEEP
12288:STx5KRZ18xtSP+szdcIugOO50MMEMOkPqrx:XmxtSP+sJ+O5FWPP4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d66a4cc1545f58f91d01c81dcac09577642b9f5a93ac38c567870c02c5783dd9
Files
-
d66a4cc1545f58f91d01c81dcac09577642b9f5a93ac38c567870c02c5783dd9.exe windows:6 windows x86 arch:x86
670ae0d1692589f452ed57856009db18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
kernel32
lstrlenW
LocalFree
GetFileAttributesW
ExpandEnvironmentStringsW
GetProcessHeap
FreeLibrary
GetProcAddress
GetLastError
HeapSetInformation
GetCommandLineW
DelayLoadFailureHook
InterlockedCompareExchange
LoadLibraryExA
HeapFree
LoadLibraryW
WideCharToMultiByte
LocalAlloc
IsDBCSLeadByte
RegisterApplicationRestart
lstrlenA
HeapAlloc
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
Sleep
InterlockedExchange
gdi32
GetStockObject
user32
CreateWindowExW
MessageBoxW
LoadCursorW
DefWindowProcW
PostQuitMessage
RegisterClassW
LoadIconW
LoadStringW
msvcrt
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
__setusermatherr
_exit
_cexit
__getmainargs
memset
__p__commode
__p__fmode
_XcptFilter
memcpy
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
_controlfp
shell32
CommandLineToArgvW
shlwapi
StrCmpIW
PathRemoveFileSpecW
PathFindExtensionW
StrCmpNIW
PathAppendW
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 488KB - Virtual size: 487KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE