Static task
static1
Behavioral task
behavioral1
Sample
pafish64.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
pafish64.exe
Resource
win11-20240709-en
General
-
Target
pafish64.exe
-
Size
118KB
-
MD5
4b6229d1b32d7346cf4c8312a8bc7925
-
SHA1
4d83e18a7e1650b4f9bb5e866ea4ad97a21522bd
-
SHA256
ff24b9da6cddd77f8c19169134eb054130567825eee1008b5a32244e1028e76f
-
SHA512
804f7e663f3a4e03f99e19f7ad8e89362c9d11793ece2e0716f86bce020f6ce95766fc4f6e686375b73d0b6765cc75029d8d6527abe0777b91ec807f81c7146a
-
SSDEEP
3072:wgjIzC10pKQ6PbNehdv3I0lmPendNyrOMGTkrNRD:wgSCuMDendVMGTuNR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource pafish64.exe
Files
-
pafish64.exe.exe windows:4 windows x64 arch:x64
6b8cf599a34a9fd7f0f7abd7b1490e9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
iphlpapi
GetAdaptersAddresses
kernel32
CloseHandle
CreateFileA
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
EnterCriticalSection
GetConsoleScreenBufferInfo
GetConsoleWindow
GetCurrentProcess
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GlobalMemoryStatusEx
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
Process32First
Process32Next
SetConsoleTextAttribute
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
lstrcmpiA
mpr
WNetGetProviderNameA
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_commode
_errno
_fmode
_initterm
_lock
_onexit
_unlock
abort
calloc
exit
fclose
fopen
fprintf
fputc
fputs
free
fwrite
getchar
localeconv
malloc
mbstowcs
memcmp
memcpy
memset
rand
signal
srand
strerror
strlen
strncat
strncmp
strncpy
strstr
toupper
vfprintf
wcslen
wcsstr
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoUninitialize
oleaut32
SysAllocString
SysFreeString
user32
CallNextHookEx
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageA
FindWindowA
GetClientRect
GetCursorPos
GetDoubleClickTime
GetMessageA
GetSysColorBrush
GetSystemMetrics
GetWindowRect
KillTimer
LoadCursorA
MessageBeep
PostMessageA
PostQuitMessage
RegisterClassW
SetTimer
SetWindowsHookExA
ShowWindow
TranslateMessage
UnhookWindowsHookEx
ws2_32
freeaddrinfo
getaddrinfo
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE