H:\Desarrollo\TFS\Installers\Products\CloudAv\Release\Version 7.05.00.0047.x\Source\Code\Projects\PSINanoRun\ProjectWin\bin\Release\PSINanoRun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_8d61f6b8d434ea94b473f46eee5c3b23_mafia.exe
Resource
win7-20231215-en
General
-
Target
2024-02-03_8d61f6b8d434ea94b473f46eee5c3b23_mafia
-
Size
1.8MB
-
MD5
8d61f6b8d434ea94b473f46eee5c3b23
-
SHA1
0ed63b18d1aee7b6064d77495a077bbd4ad8c160
-
SHA256
5564b11ec6052707282dfacb40933acae23a9c691d464610cd2056a9f972744c
-
SHA512
18add75a1ee40d6ada83dc154bd37f8b9fd621ca368e936e46a65a7abc2c27262c7576958e973be45375a3c5614fae1736d393479c59f15f498c4293209d2242
-
SSDEEP
24576:1UNx+O2R52FaGZTKYD0AtP2JOt934J7Z6bQaj1BvUm9J:TRR52FaG8YD0AEJE3jM2ce
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-03_8d61f6b8d434ea94b473f46eee5c3b23_mafia
Files
-
2024-02-03_8d61f6b8d434ea94b473f46eee5c3b23_mafia.exe windows:5 windows x86 arch:x86
3c214c8050a1a2606dc2b346d8391e5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdiplus
GdiplusShutdown
GdiplusStartup
kernel32
LoadLibraryA
LoadLibraryExA
FormatMessageA
LocalFree
GetDateFormatW
OutputDebugStringW
GetTimeFormatW
GetLocalTime
GetCurrentThreadId
HeapAlloc
HeapFree
LocalAlloc
EnumSystemLocalesA
GetFileAttributesW
GetUserDefaultLCID
GetStringTypeW
WriteConsoleW
SetStdHandle
InterlockedExchange
GetProcessHeap
CreateFileW
HeapSetInformation
ReadFile
WriteFile
CreateDirectoryW
SetFilePointer
InterlockedCompareExchange
GetVersionExA
lstrcmpiW
GetVersionExW
GetTempPathW
GetExitCodeProcess
GetCurrentProcessId
CloseHandle
TerminateProcess
LoadLibraryW
OpenProcess
WaitForSingleObject
GetCurrentProcess
CreateProcessW
GetUserDefaultLangID
SetLastError
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentVariableW
DeleteFileW
GetTempFileNameW
GetLastError
WritePrivateProfileStringW
Sleep
GetCommandLineW
DeleteCriticalSection
EnterCriticalSection
GetProcAddress
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
GetModuleHandleExW
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
FreeLibrary
IsValidLocale
SetEndOfFile
GetLocaleInfoA
EncodePointer
DecodePointer
GetStartupInfoW
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
IsProcessorFeaturePresent
HeapCreate
ExitProcess
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RaiseException
HeapSize
GetLocaleInfoW
GetCPInfo
GetACP
user32
GetSystemMetrics
MessageBoxW
advapi32
GetTokenInformation
RegQueryValueExW
CreateProcessAsUserW
FreeSid
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
CryptGetHashParam
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExW
RevertToSelf
ImpersonateLoggedOnUser
LookupPrivilegeValueW
SetTokenInformation
OpenProcessToken
shell32
FindExecutableW
ShellExecuteW
ole32
CLSIDFromString
CoInitializeEx
CoUninitialize
Sections
.text Size: 333KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE