H:\Desarrollo\TFS\Installers\Products\CloudAv\Release\Version 7.05.00.0047.x\Source\Code\Projects\PSINanoRun\ProjectWin\bin\Release\PSINanoRun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_3d92b434ef9b36e3271b82f24f3f7665_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_3d92b434ef9b36e3271b82f24f3f7665_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-03_3d92b434ef9b36e3271b82f24f3f7665_mafia
-
Size
1.8MB
-
MD5
3d92b434ef9b36e3271b82f24f3f7665
-
SHA1
0cea7de9777bd7160b2f0945d5e244903f808c98
-
SHA256
9e03e1e0d6e0e7bb38a907e04c52bdc4e94f67a96c4220500722fb621424ed4d
-
SHA512
73652fd273fd67e3ca3e1052d9562e23eb5f1004c09c0ab1dd7d512f276109b48ab9ed238c2cc9a51fcbe558696e18119d37e88cf04b6e1fc6392b757fbfdd77
-
SSDEEP
24576:7UNx+O2R52FaGZTKYD0AtA2JOt934J7Z6bQaj1BvUm9J:9RR52FaG8YD0AFJE3jM2ce
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-03_3d92b434ef9b36e3271b82f24f3f7665_mafia
Files
-
2024-02-03_3d92b434ef9b36e3271b82f24f3f7665_mafia.exe windows:5 windows x86 arch:x86
3c214c8050a1a2606dc2b346d8391e5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdiplus
GdiplusShutdown
GdiplusStartup
kernel32
LoadLibraryA
LoadLibraryExA
FormatMessageA
LocalFree
GetDateFormatW
OutputDebugStringW
GetTimeFormatW
GetLocalTime
GetCurrentThreadId
HeapAlloc
HeapFree
LocalAlloc
EnumSystemLocalesA
GetFileAttributesW
GetUserDefaultLCID
GetStringTypeW
WriteConsoleW
SetStdHandle
InterlockedExchange
GetProcessHeap
CreateFileW
HeapSetInformation
ReadFile
WriteFile
CreateDirectoryW
SetFilePointer
InterlockedCompareExchange
GetVersionExA
lstrcmpiW
GetVersionExW
GetTempPathW
GetExitCodeProcess
GetCurrentProcessId
CloseHandle
TerminateProcess
LoadLibraryW
OpenProcess
WaitForSingleObject
GetCurrentProcess
CreateProcessW
GetUserDefaultLangID
SetLastError
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentVariableW
DeleteFileW
GetTempFileNameW
GetLastError
WritePrivateProfileStringW
Sleep
GetCommandLineW
DeleteCriticalSection
EnterCriticalSection
GetProcAddress
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
GetModuleHandleExW
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
FreeLibrary
IsValidLocale
SetEndOfFile
GetLocaleInfoA
EncodePointer
DecodePointer
GetStartupInfoW
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
IsProcessorFeaturePresent
HeapCreate
ExitProcess
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RaiseException
HeapSize
GetLocaleInfoW
GetCPInfo
GetACP
user32
GetSystemMetrics
MessageBoxW
advapi32
GetTokenInformation
RegQueryValueExW
CreateProcessAsUserW
FreeSid
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
CryptGetHashParam
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExW
RevertToSelf
ImpersonateLoggedOnUser
LookupPrivilegeValueW
SetTokenInformation
OpenProcessToken
shell32
FindExecutableW
ShellExecuteW
ole32
CLSIDFromString
CoInitializeEx
CoUninitialize
Sections
.text Size: 333KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE