C:\Users\John\Dev\horizon\Utility\UpdaterEngine\Release\UpdaterEngine.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_c8ffdafdeb864d6c7c039f87b96a9259_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_c8ffdafdeb864d6c7c039f87b96a9259_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_c8ffdafdeb864d6c7c039f87b96a9259_mafia
-
Size
2.7MB
-
MD5
c8ffdafdeb864d6c7c039f87b96a9259
-
SHA1
517aa66b6e3eea3adadc481a548070f3e8957b3f
-
SHA256
9ce35a9af3c2c1b5227c6a636520059247bc3cc0640eb209a588b0502bfb9c68
-
SHA512
0da92fc934b70a2a6a842feafe322cd5df3f96afc8c9c03a6064429fab1bb1a361c7acb635fae526c47ffb522f7e856a20eb134ad461dc17abd54f4c6ca501b8
-
SSDEEP
49152:nMYsOAxPwEwqOm9rVWyaclrvcTUwB3ODm0:nMYGxTwqOcc9clv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-17_c8ffdafdeb864d6c7c039f87b96a9259_mafia
Files
-
2024-02-17_c8ffdafdeb864d6c7c039f87b96a9259_mafia.exe windows:5 windows x86 arch:x86
e1d3327cc296d61b0e5e6efccd21ecc1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
QueryPerformanceCounter
QueryPerformanceFrequency
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CreateFileW
WriteConsoleW
CreateFileA
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetCurrentDirectoryA
LoadLibraryW
GetLocaleInfoW
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetModuleFileNameW
GetCurrentThreadId
SetCurrentDirectoryA
GetProcAddress
CreateThread
WaitForSingleObject
MoveFileA
MulDiv
SizeofResource
GetTickCount
GetVersionExA
GetModuleFileNameA
CopyFileA
GetLongPathNameA
MoveFileExA
CreateProcessA
GetCurrentProcess
LocalAlloc
CloseHandle
LoadLibraryA
FreeLibrary
GetLastError
FindNextFileA
FindClose
RemoveDirectoryA
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
GetTempPathA
FindFirstFileA
CreateDirectoryA
GetFileAttributesA
GetTimeZoneInformation
DeleteFileA
SetLastError
TlsFree
TlsSetValue
GetProcessHeap
TlsGetValue
TlsAlloc
HeapCreate
GetFileType
GetStdHandle
SetHandleCount
GetConsoleMode
GetConsoleCP
WriteFile
ReadFile
InitializeCriticalSectionAndSpinCount
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetFilePointer
IsProcessorFeaturePresent
GetCPInfo
LCMapStringW
ExitProcess
GetModuleHandleW
HeapReAlloc
FindFirstFileExA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemTimeAsFileTime
GetStartupInfoW
InterlockedExchange
RaiseException
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
RtlUnwind
HeapAlloc
GetCommandLineA
HeapSetInformation
user32
GetDC
SendDlgItemMessageA
EndDialog
SetTimer
DialogBoxParamA
KillTimer
TranslateMessage
DispatchMessageA
PeekMessageA
MoveWindow
ScreenToClient
EnableWindow
PostQuitMessage
OffsetRect
ShowWindow
LoadIconA
GetWindowRect
SendMessageA
GetDlgItem
SetWindowTextA
CreateDialogParamA
GetMessageA
GetDlgItemTextA
MessageBoxA
wsprintfA
GetClientRect
gdi32
CreateFontA
SelectObject
SetBkMode
GetTextExtentPoint32A
TextOutA
StretchDIBits
DeleteObject
CreateSolidBrush
SetBkColor
SetTextColor
GetDeviceCaps
advapi32
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegSetValueExA
RegCreateKeyExA
RegSetValueA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
shell32
SHGetPathFromIDListA
ShellExecuteExA
SHBrowseForFolderA
SHFileOperationA
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
wsock32
inet_ntoa
htonl
ntohs
socket
htons
WSAStartup
WSACleanup
ioctlsocket
gethostbyaddr
gethostbyname
recv
send
__WSAFDIsSet
select
WSAGetLastError
connect
closesocket
shutdown
ntohl
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 854KB - Virtual size: 853KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 314KB - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ