wab.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-24_80324059f316b867117c9053fcd4463c_karagany_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-24_80324059f316b867117c9053fcd4463c_karagany_mafia
-
Size
782KB
-
MD5
80324059f316b867117c9053fcd4463c
-
SHA1
e8ff06ea766ee6a8be4b3af64124373c3a0b773e
-
SHA256
2b1f11ae6781e864ba51d6fc4affe89304ab769e6bd2978e6c3f552429d69aab
-
SHA512
f01fb9e35f8bfab5540f92ce48319afedc753447c23f5cfe0c11d3b19a59baf0ed3e0e0ed973b9dbd2a32bc258c0bdeea36830f23bb85780c132b1c952b7e8fc
-
SSDEEP
24576:EF0BLKMPhP70bAm3tAsovKKvMTDongQGfFvRkX:TTZhsovKKvbgvNvCX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-24_80324059f316b867117c9053fcd4463c_karagany_mafia
Files
-
2024-06-24_80324059f316b867117c9053fcd4463c_karagany_mafia.exe windows:10 windows x86 arch:x86
0ef04699a47ecf41df8e2b3dd1491d68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
EventUnregister
RegOpenKeyExW
EventSetInformation
EventRegister
EventWriteTransfer
RegCloseKey
kernel32
ExpandEnvironmentStringsW
GetCommandLineW
GetLastError
LoadLibraryW
HeapSetInformation
GetProcAddress
LocalFree
GetProcessHeap
FreeLibrary
Sleep
HeapFree
GetFileAttributesW
DelayLoadFailureHook
ResolveDelayLoadedAPI
LocalAlloc
IsDBCSLeadByte
HeapAlloc
RegisterApplicationRestart
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
gdi32
GetStockObject
user32
RegisterClassW
LoadIconW
LoadCursorW
PostQuitMessage
LoadStringW
CreateWindowExW
MessageBoxW
DefWindowProcW
msvcrt
__p__fmode
_cexit
memset
exit
__set_app_type
__getmainargs
__setusermatherr
__p__commode
_XcptFilter
_initterm
_controlfp
_except_handler4_common
_ismbblead
_amsg_exit
?terminate@@YAXXZ
memcpy
_acmdln
_exit
shell32
CommandLineToArgvW
shlwapi
PathFindExtensionW
PathAppendW
PathRemoveFileSpecW
StrCmpNIW
StrCmpIW
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 488KB - Virtual size: 488KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ