H:\Desarrollo\TFS\Installers\Products\CloudAv\Release\Version 7.05.00.0047.x\Source\Code\Projects\PSINanoRun\ProjectWin\bin\Release\PSINanoRun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_3c270732fe6d2b48451fc28cd4e2f0e8_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_3c270732fe6d2b48451fc28cd4e2f0e8_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-03_3c270732fe6d2b48451fc28cd4e2f0e8_mafia
-
Size
1.8MB
-
MD5
3c270732fe6d2b48451fc28cd4e2f0e8
-
SHA1
84c3138e7e018fe6619f76ab5de4bfeef5e4529b
-
SHA256
da1b526ecc0958ef356e18f2062cc82b924ace39cc85f4f7f43e79238630559b
-
SHA512
83c43ee8eaf9e13ca22f2d59a2102186de3094aa74f6bf155c5ccefa1d12d02835d4cd099018a3f1f85769401b6f7456af51d13058cb25bec2984c0c05869a2a
-
SSDEEP
24576:uUNx+O2R52FaGZTKYD0AtQ2JOt934J7Z6bQaj1BvUm9J:gRR52FaG8YD0ApJE3jM2ce
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-03_3c270732fe6d2b48451fc28cd4e2f0e8_mafia
Files
-
2024-02-03_3c270732fe6d2b48451fc28cd4e2f0e8_mafia.exe windows:5 windows x86 arch:x86
3c214c8050a1a2606dc2b346d8391e5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdiplus
GdiplusShutdown
GdiplusStartup
kernel32
LoadLibraryA
LoadLibraryExA
FormatMessageA
LocalFree
GetDateFormatW
OutputDebugStringW
GetTimeFormatW
GetLocalTime
GetCurrentThreadId
HeapAlloc
HeapFree
LocalAlloc
EnumSystemLocalesA
GetFileAttributesW
GetUserDefaultLCID
GetStringTypeW
WriteConsoleW
SetStdHandle
InterlockedExchange
GetProcessHeap
CreateFileW
HeapSetInformation
ReadFile
WriteFile
CreateDirectoryW
SetFilePointer
InterlockedCompareExchange
GetVersionExA
lstrcmpiW
GetVersionExW
GetTempPathW
GetExitCodeProcess
GetCurrentProcessId
CloseHandle
TerminateProcess
LoadLibraryW
OpenProcess
WaitForSingleObject
GetCurrentProcess
CreateProcessW
GetUserDefaultLangID
SetLastError
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentVariableW
DeleteFileW
GetTempFileNameW
GetLastError
WritePrivateProfileStringW
Sleep
GetCommandLineW
DeleteCriticalSection
EnterCriticalSection
GetProcAddress
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
GetModuleHandleExW
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
FreeLibrary
IsValidLocale
SetEndOfFile
GetLocaleInfoA
EncodePointer
DecodePointer
GetStartupInfoW
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
IsProcessorFeaturePresent
HeapCreate
ExitProcess
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RaiseException
HeapSize
GetLocaleInfoW
GetCPInfo
GetACP
user32
GetSystemMetrics
MessageBoxW
advapi32
GetTokenInformation
RegQueryValueExW
CreateProcessAsUserW
FreeSid
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
CryptGetHashParam
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExW
RevertToSelf
ImpersonateLoggedOnUser
LookupPrivilegeValueW
SetTokenInformation
OpenProcessToken
shell32
FindExecutableW
ShellExecuteW
ole32
CLSIDFromString
CoInitializeEx
CoUninitialize
Sections
.text Size: 333KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE