C:\Users\alfon\Desktop\INJECTOR\output\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
RAVENWARE-MWIII-UNLOCKER+BLOCKER.exe
Resource
win10v2004-20240611-en
General
-
Target
RAVENWARE-MWIII-UNLOCKER+BLOCKER.exe
-
Size
867KB
-
MD5
422774b6b2f51d5ac05bd4e7fdcab778
-
SHA1
db4396fd5b1f2563a0e739fc6975657c1d3b4464
-
SHA256
e1589f28086d57b7cf29db5917d74d90c507189ef3c536a5dfc62c5b386f3f4a
-
SHA512
f5973a45202704315e0fe4012702e662511ba36d625643fa8bf90c1c0bf4a0fa462fbc16505b0c4894ba80506b8402caf9f43c88512e4687be73d453978ad31f
-
SSDEEP
12288:A1lxZhYap4d10TEBghQqTxKI7B/ih7qL3l4+PZE9O2bJIC0fDNN79K:A1bZhjpoK1hQWx577Ll4+O93l0fZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RAVENWARE-MWIII-UNLOCKER+BLOCKER.exe
Files
-
RAVENWARE-MWIII-UNLOCKER+BLOCKER.exe.exe windows:6 windows x64 arch:x64
6cd0d4010fbf6c1abe864391ab3f781c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
DeleteFileW
LoadLibraryA
CreateFileA
Process32NextW
GetLastError
OutputDebugStringW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetFileInformationByHandleEx
AreFileApisANSI
SetFileInformationByHandle
Sleep
GetFileAttributesExW
FindFirstFileW
LoadLibraryW
GetLocaleInfoEx
WideCharToMultiByte
GetFileSizeEx
WaitForMultipleObjects
PeekNamedPipe
GetFileType
GetEnvironmentVariableA
MultiByteToWideChar
WaitForSingleObjectEx
MoveFileExA
GetTickCount
QueryPerformanceCounter
VerifyVersionInfoA
GetSystemDirectoryA
QueryPerformanceFrequency
SleepEx
LeaveCriticalSection
EnterCriticalSection
LocalFree
FormatMessageA
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
VirtualProtect
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DeviceIoControl
Process32FirstW
GetWindowsDirectoryW
Beep
GetProcAddress
FreeLibrary
GetConsoleWindow
QueryFullProcessImageNameW
FindClose
IsDebuggerPresent
CreateToolhelp32Snapshot
LoadLibraryExA
TerminateProcess
VirtualAlloc
WriteFile
GetStdHandle
GetCurrentProcess
VirtualFree
SetConsoleTextAttribute
SetLastError
ReadFile
CloseHandle
CreateFileW
user32
MessageBoxW
PostThreadMessageW
UnhookWindowsHookEx
EnumWindows
GetWindowThreadProcessId
SetWindowsHookExW
shell32
ShellExecuteW
msvcp140
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
?_Xbad_function_call@std@@YAXXZ
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??Bid@locale@std@@QEAA_KXZ
?always_noconv@codecvt_base@std@@QEBA_NXZ
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?good@ios_base@std@@QEBA_NXZ
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?uncaught_exceptions@std@@YAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?_Xout_of_range@std@@YAXPEBD@Z
?_Winerror_map@std@@YAHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?id@?$ctype@D@std@@2V0locale@2@A
?_Xlength_error@std@@YAXPEBD@Z
?_Syserror_map@std@@YAPEBDH@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
ntdll
VerSetConditionMask
RtlCaptureContext
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlImageNtHeader
normaliz
IdnToAscii
wldap32
ord217
ord46
ord211
ord60
ord45
ord50
ord41
ord143
ord26
ord27
ord32
ord33
ord301
ord200
ord30
ord79
ord22
ord35
crypt32
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
ws2_32
sendto
recvfrom
closesocket
ntohs
gethostname
recv
send
WSAGetLastError
getsockopt
ntohl
getsockname
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
getpeername
htonl
connect
accept
WSACleanup
WSAStartup
setsockopt
socket
WSAIoctl
bind
WSASetLastError
htons
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_copy
_CxxThrowException
memcmp
memcpy
memmove
memset
__std_exception_destroy
memchr
strchr
strrchr
strstr
__C_specific_handler
__current_exception
__current_exception_context
__std_terminate
api-ms-win-crt-string-l1-1-0
strpbrk
strcspn
strspn
strcmp
strcpy_s
isupper
tolower
strncmp
_strdup
strncpy
api-ms-win-crt-runtime-l1-1-0
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
abort
_invalid_parameter_noinfo
_crt_atexit
exit
__sys_nerr
strerror
terminate
_resetstkoflw
_cexit
_seh_filter_exe
_set_app_type
_beginthreadex
system
_get_initial_narrow_environment
_register_thread_local_exe_atexit_callback
_c_exit
__p___argv
__p___argc
_errno
_initterm
_invalid_parameter_noinfo_noreturn
_getpid
_initterm_e
_exit
api-ms-win-crt-stdio-l1-1-0
_set_fmode
setvbuf
fgetpos
fsetpos
fwrite
fread
_get_stream_buffer_pointers
__p__commode
fgets
fgetc
_pclose
_popen
fclose
fflush
__stdio_common_vsprintf
_lseeki64
_read
fputc
_write
__acrt_iob_func
_close
_open
fopen
fputs
ungetc
feof
fseek
_fseeki64
ftell
__stdio_common_vsscanf
api-ms-win-crt-heap-l1-1-0
calloc
realloc
_set_new_mode
malloc
_callnewh
free
api-ms-win-crt-utility-l1-1-0
rand
srand
qsort
api-ms-win-crt-time-l1-1-0
_time64
_localtime64_s
strftime
_gmtime64
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_fstat64
_unlink
_access
_stat64
_unlock_file
api-ms-win-crt-convert-l1-1-0
strtoll
atoi
strtod
strtoul
strtoull
strtol
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
localeconv
___lc_codepage_func
api-ms-win-crt-math-l1-1-0
_dclass
__setusermatherr
advapi32
AddAccessAllowedAce
CryptDestroyKey
CryptImportKey
CryptEncrypt
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
ConvertSidToStringSidA
CopySid
SetSecurityInfo
IsValidSid
InitializeAcl
GetTokenInformation
GetLengthSid
OpenProcessToken
CryptDestroyHash
Sections
.text Size: 464KB - Virtual size: 463KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 272KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ