_mazafaka
Static task
static1
Behavioral task
behavioral1
Sample
7ab2d3c244c0cdb321d08dc3b5c272c4136fc2bc0e9ca8d3689d4938388ee2ce.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7ab2d3c244c0cdb321d08dc3b5c272c4136fc2bc0e9ca8d3689d4938388ee2ce.exe
Resource
win10v2004-20220812-en
General
-
Target
7ab2d3c244c0cdb321d08dc3b5c272c4136fc2bc0e9ca8d3689d4938388ee2ce
-
Size
835KB
-
MD5
4b1a4767c3c754f9b82b772341e9df29
-
SHA1
c2490edd56e72c064dace6a1b5cbd311fb2f19ba
-
SHA256
7ab2d3c244c0cdb321d08dc3b5c272c4136fc2bc0e9ca8d3689d4938388ee2ce
-
SHA512
f1bfde4f257f229783683592883eb1c5e4a81899517fca11f584202f8eab0ea881a42fd32badb50bcb2be2411421bb4a576be383075fc306356dea71dbc5ce13
-
SSDEEP
12288:zk3wV9Snvb3F+3GZxYVfQPzKHQ1Z9bSMEPg1+9CdRBYOseMWSEpjSTGUAUmfkRoW:zzSB+3GsVfQPGHIm7u+MykMZYSh+kCc
Malware Config
Signatures
Files
-
7ab2d3c244c0cdb321d08dc3b5c272c4136fc2bc0e9ca8d3689d4938388ee2ce.exe windows x86
e1cb20fa0322bb22ebbd7c2e76ab113f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetPrivateProfileIntA
RtlUnwind
CloseHandle
SetEndOfFile
GetStringTypeA
HeapSize
ReleaseMutex
lstrlenA
SetEnvironmentVariableA
OutputDebugStringA
DeleteFileA
WriteFile
GetVersionExA
CopyFileA
lstrcpyA
VirtualAlloc
ExitProcess
GlobalLock
GetModuleHandleA
GetCurrentThreadId
GetTickCount
GetThreadLocale
GlobalUnlock
FindFirstFileA
GetCommandLineA
GetEnvironmentVariableA
TerminateProcess
FreeLibrary
LCMapStringA
UnlockFile
VirtualFree
HeapDestroy
GlobalFree
CreateDirectoryA
GetFileType
TlsFree
GetCPInfo
GetConsoleCP
ExitThread
VirtualProtect
GetSystemDirectoryA
SizeofResource
LoadResource
GetStringTypeW
lstrcpynA
IsBadWritePtr
WideCharToMultiByte
GetFileAttributesA
GetStartupInfoA
TlsSetValue
GetSystemInfo
GetProcessVersion
LockFile
GetPrivateProfileSectionA
GlobalFindAtomA
MultiByteToWideChar
FindResourceA
GetModuleFileNameA
GetFileTime
MulDiv
GlobalDeleteAtom
CreateFileA
GlobalAddAtomA
GetVersion
GlobalReAlloc
lstrcatA
FreeEnvironmentStringsW
GetCurrentThread
IsBadReadPtr
CreateMutexA
DuplicateHandle
FileTimeToSystemTime
GetFullPathNameA
UnhandledExceptionFilter
IsBadCodePtr
lstrcmpiA
HeapReAlloc
GetCurrentDirectoryA
TlsAlloc
SetFilePointer
GetStdHandle
Sleep
LockResource
GetProcAddress
GlobalFlags
GetACP
SetHandleCount
CompareStringA
GetProfileStringA
GetLastError
GetOEMCP
GetDriveTypeA
FreeEnvironmentStringsA
LCMapStringW
InterlockedDecrement
LoadLibraryA
HeapFree
GlobalAlloc
lstrcmpA
FileTimeToLocalFileTime
GetCurrentProcess
lstrlenW
WritePrivateProfileStringA
TlsGetValue
GetEnvironmentStringsW
LocalAlloc
LeaveCriticalSection
GlobalHandle
GetShortPathNameA
GetFileSize
GetTimeZoneInformation
SetFileAttributesA
HeapCreate
FindClose
SetErrorMode
InitializeCriticalSection
ReadFile
FlushFileBuffers
InterlockedIncrement
GetTempPathA
LocalReAlloc
GetPrivateProfileStringA
GlobalGetAtomNameA
GetLocalTime
CompareStringW
SetStdHandle
GetVolumeInformationA
SetUnhandledExceptionFilter
LocalFree
GetEnvironmentStrings
EnterCriticalSection
DeleteCriticalSection
FormatMessageA
RaiseException
SetLastError
user32
BeginPaint
SetActiveWindow
ExcludeUpdateRgn
GetWindowRect
GetForegroundWindow
CharUpperA
GetWindowDC
IsDialogMessageA
PostThreadMessageA
DrawIcon
GetMenuCheckMarkDimensions
LoadImageA
GetIconInfo
GetTopWindow
SetWindowLongA
IsWindowVisible
CallNextHookEx
GetScrollInfo
LoadIconA
RemovePropA
SetWindowTextA
FillRect
MoveWindow
TranslateMessage
GetMessageTime
DrawEdge
PeekMessageA
UnhookWindowsHookEx
DestroyIcon
GetDC
DrawTextA
MapWindowPoints
GetParent
EndDialog
TrackPopupMenuEx
GetCursorPos
ShowCaret
DrawStateA
GetWindowTextLengthA
GetMenuState
CopyAcceleratorTableA
LoadStringA
DrawFocusRect
GetSubMenu
FrameRect
CreateDialogIndirectParamA
LoadBitmapA
SetScrollPos
ModifyMenuA
GetWindowPlacement
BringWindowToTop
GetCapture
LoadCursorA
IsIconic
GetSystemMetrics
InflateRect
GetNextDlgGroupItem
PtInRect
IsWindowEnabled
IntersectRect
ShowWindow
PostQuitMessage
MessageBeep
GetWindow
SetFocus
UpdateWindow
PostMessageA
GetMenuItemCount
SetCursor
GetMenuItemID
GetSysColor
GetClassLongA
GetKeyState
MapDialogRect
SetWindowPos
OffsetRect
GetWindowLongA
GetMessagePos
IsWindow
EnableMenuItem
GetLastActivePopup
IsChild
DestroyMenu
GrayStringA
GetDlgItem
DefWindowProcA
DrawIconEx
SetTimer
LoadMenuA
SetWindowContextHelpId
EndPaint
GetClientRect
GetMenu
SetRect
CharNextA
GetWindowTextA
CreateWindowExA
CreateIconIndirect
CallWindowProcA
WinHelpA
ScreenToClient
DestroyWindow
RegisterClassA
GetClassInfoA
SetMenuItemBitmaps
CopyRect
RedrawWindow
UnregisterClassA
RegisterClipboardFormatA
SetPropA
wsprintfA
GetActiveWindow
ValidateRect
HideCaret
CheckMenuItem
DispatchMessageA
SendMessageA
WindowFromPoint
SendDlgItemMessageA
GetDesktopWindow
TabbedTextOutA
ClientToScreen
KillTimer
GetMessageA
SetScrollInfo
SetForegroundWindow
InvalidateRect
DestroyCursor
DefDlgProcA
GetNextDlgTabItem
SetWindowsHookExA
IsWindowUnicode
ReleaseDC
GetDlgCtrlID
GetFocus
AdjustWindowRectEx
SetWindowRgn
GetSysColorBrush
wvsprintfA
GetPropA
GetClassNameA
MessageBoxA
SystemParametersInfoA
RegisterWindowMessageA
EnableWindow
gdi32
LineTo
CreateCompatibleBitmap
GetPixel
GetWindowExtEx
BitBlt
GetViewportExtEx
GetMapMode
CreateSolidBrush
CombineRgn
OffsetViewportOrgEx
SetViewportOrgEx
FillRgn
CreateRectRgn
GetClipBox
CreateRoundRectRgn
CreatePolygonRgn
SetTextColor
SetBkMode
SetMapMode
GetStockObject
LPtoDP
Escape
Rectangle
FrameRgn
CreateDIBitmap
IntersectClipRect
ScaleViewportExtEx
GetTextExtentPoint32A
CreateCompatibleDC
ScaleWindowExtEx
CreateBitmap
PtVisible
GetCurrentObject
SetPixel
DPtoLP
RestoreDC
CreatePen
DeleteDC
PatBlt
GetTextExtentPointA
SetWindowOrgEx
SetBkColor
SelectObject
DeleteObject
GetDeviceCaps
TextOutA
MoveToEx
CreateFontIndirectA
GetBkColor
GetObjectA
SetViewportExtEx
SetWindowExtEx
RectVisible
SaveDC
ExtTextOutA
GetTextColor
CreateFontA
SelectClipRgn
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegSetValueExA
RegOpenKeyA
RegCloseKey
RegQueryValueA
RegEnumKeyA
RegSetValueA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
AllocateLocallyUniqueId
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
ExtractIconA
ShellExecuteExA
SHGetFileInfoA
ole32
CLSIDFromString
StringFromCLSID
StgCreateDocfileOnILockBytes
CoDisconnectObject
CoTaskMemAlloc
CLSIDFromProgID
OleInitialize
CoTaskMemFree
StgOpenStorageOnILockBytes
CoCreateInstance
CoRevokeClassObject
OleIsCurrentClipboard
CoFreeUnusedLibraries
OleUninitialize
CoGetClassObject
OleRun
OleFlushClipboard
CoRegisterClassObject
CoInitialize
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
oleaut32
GetErrorInfo
LoadTypeLi
SysAllocStringLen
VariantCopy
SysStringByteLen
SysAllocStringByteLen
VariantChangeType
SysStringLen
SysFreeString
SysAllocString
VariantTimeToSystemTime
VariantInit
OleCreateFontIndirect
VariantClear
comctl32
ImageList_SetBkColor
ImageList_AddMasked
ord17
ImageList_GetImageInfo
ImageList_Destroy
_TrackMouseEvent
ImageList_GetBkColor
ImageList_DrawIndirect
ImageList_Create
ImageList_LoadImageA
imm32
ImmAssociateContext
oledlg
ord8
dnsapi
DnsAcquireContextHandle_A
Exports
Exports
Sections
.text Size: 487KB - Virtual size: 486KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.s6 Size: - Virtual size: 5.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s3 Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s4 Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s5 Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ