E:\Myprj\down\git\adkiller\src\Release\GeYaVideo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_1998b8a2833ed74ec285a707539d21af_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-19_1998b8a2833ed74ec285a707539d21af_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-19_1998b8a2833ed74ec285a707539d21af_mafia
-
Size
2.3MB
-
MD5
1998b8a2833ed74ec285a707539d21af
-
SHA1
2cbe933f9d6d9f3ae83c2e4b0df672d663d6e01b
-
SHA256
05a635dd976e5853cfeb5726876566af5dae6017b5fcde81872857e87ba7a923
-
SHA512
6aae3e9c80524bf9b133429629aa6b57aade8b0ba087180e6828bf2972319ace1c4e2562d9e3353952e0a96b1ad1df6b5254a46f17562bf6bc0d0594838ceaf5
-
SSDEEP
24576:WKsR3Gr/9oPzg9yWEerGrPThDhBoxy3FGiw3JY52oHDa8JoazOP4kv36tsOTq1Mi:WcIei1jGiK4Xe8JlQ4kv36GOT2GIV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-19_1998b8a2833ed74ec285a707539d21af_mafia
Files
-
2024-02-19_1998b8a2833ed74ec285a707539d21af_mafia.exe windows:5 windows x86 arch:x86
c04104d1cf0636ce1af1f909f61588ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winhttp
WinHttpCloseHandle
WinHttpOpen
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
ws2_32
htons
send
ntohs
accept
listen
socket
bind
getsockname
inet_addr
WSAGetLastError
getsockopt
setsockopt
connect
ioctlsocket
sendto
recvfrom
gethostbyname
WSASetLastError
closesocket
WSAStartup
WSACleanup
recv
__WSAFDIsSet
select
inet_ntoa
htonl
ntohl
gethostbyaddr
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
CreateProcessA
CreateProcessW
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
GetCurrentThreadId
FlushInstructionCache
GetThreadContext
SetThreadContext
SuspendThread
GetCurrentThread
SetLastError
WriteFile
MapViewOfFile
CreateFileMappingW
GetFileSize
SetFilePointer
UnmapViewOfFile
LoadLibraryA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
InitializeCriticalSectionAndSpinCount
DeleteFileW
GetTickCount
lstrcmpW
MulDiv
InterlockedIncrement
RaiseException
GetTempFileNameW
GetTempPathW
CreateThread
TerminateProcess
WaitForSingleObject
OpenMutexW
MoveFileExW
GetCurrentProcessId
GlobalFree
GlobalHandle
CreateMutexW
GetModuleFileNameA
SetUnhandledExceptionFilter
SetCurrentDirectoryW
OutputDebugStringW
LoadLibraryExW
OutputDebugStringA
SetEvent
WaitForMultipleObjects
GetPrivateProfileStringW
MoveFileW
GetPrivateProfileIntW
CreateEventW
WritePrivateProfileStringW
GetPrivateProfileIntA
WritePrivateProfileStringA
PeekNamedPipe
GetStdHandle
GetFileType
SleepEx
TerminateThread
GetExitCodeThread
DuplicateHandle
ReleaseMutex
ExpandEnvironmentStringsA
FormatMessageA
SetErrorMode
VirtualFree
InitializeCriticalSection
Sleep
SetThreadPriority
OpenThread
LocalAlloc
GetSystemInfo
GetThreadPriority
LocalFree
GetThreadSelectorEntry
GetLocalTime
ConnectNamedPipe
ResumeThread
CancelIo
CreateNamedPipeW
GetNamedPipeInfo
InterlockedExchangeAdd
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileTime
CompareFileTime
ReplaceFileW
CopyFileW
GetFileAttributesW
GetFileAttributesExW
VirtualProtectEx
GetLongPathNameW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentDirectoryW
QueryDosDeviceW
GetLogicalDriveStringsW
GetShortPathNameW
FreeResource
GetNativeSystemInfo
GetVersionExW
GetUserDefaultLangID
GetCommandLineW
GetPriorityClass
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
SystemTimeToTzSpecificLocalTime
AllocConsole
AttachConsole
OpenProcess
SetInformationJobObject
GetExitCodeProcess
CreateToolhelp32Snapshot
GetProcessIoCounters
HeapSetInformation
SetPriorityClass
Process32NextW
Process32FirstW
GetProcessHeaps
GetModuleHandleExA
GetProcessId
AssignProcessToJobObject
SetHandleInformation
CreatePipe
GetProcessTimes
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
SetFileTime
GetFileInformationByHandle
lstrcmpiA
TryEnterCriticalSection
IsDebuggerPresent
InterlockedExchange
PostQueuedCompletionStatus
GetQueuedCompletionStatus
CreateIoCompletionPort
GetSystemDirectoryW
GetWindowsDirectoryW
ResetEvent
RtlCaptureStackBackTrace
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
UnregisterWaitEx
RegisterWaitForSingleObject
GetModuleHandleExW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedPushEntrySList
IsProcessorFeaturePresent
InterlockedPopEntrySList
GetConsoleCP
GetFullPathNameW
ExitProcess
GetDateFormatA
GetTimeFormatA
WriteConsoleW
FindFirstFileExA
GetDriveTypeA
GetStartupInfoW
ExitThread
RtlUnwind
DosDateTimeToFileTime
GetACP
DecodePointer
EncodePointer
IsValidCodePage
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
FatalAppExitA
GetFullPathNameA
CreateFileA
SetConsoleCtrlHandler
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
SetEnvironmentVariableA
GetDriveTypeW
WriteProcessMemory
VirtualAllocEx
VirtualQueryEx
ReadProcessMemory
GetModuleFileNameW
CreateDirectoryW
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrcmpiW
InterlockedDecrement
ReadFile
LoadLibraryW
FreeLibrary
ExpandEnvironmentStringsW
CreateFileW
GetLastError
CloseHandle
GetFileSizeEx
GetModuleHandleA
GetCurrentProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleHandleW
GetProcAddress
GetConsoleMode
SetStdHandle
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetHandleCount
GetLocaleInfoW
HeapCreate
RemoveDirectoryW
WaitNamedPipeW
SetEnvironmentVariableW
GetOEMCP
user32
SetWindowTextW
CreateAcceleratorTableW
RegisterClassExW
LoadCursorW
GetClassInfoExW
IsWindow
SetFocus
GetFocus
DestroyAcceleratorTable
GetDesktopWindow
BeginPaint
EndPaint
CallWindowProcW
DestroyWindow
SetRect
DrawTextW
IntersectRect
SetCursor
wvsprintfW
UnionRect
InflateRect
OffsetRect
GetMenu
AdjustWindowRectEx
GetPropW
SetPropW
RegisterClassW
GetWindowTextW
EnableWindow
PtInRect
GetMessageW
IsRectEmpty
PostQuitMessage
UnhookWindowsHookEx
IsZoomed
UnregisterClassA
UnregisterClassW
MsgWaitForMultipleObjectsEx
WaitMessage
DispatchMessageW
WaitForInputIdle
wsprintfW
SystemParametersInfoW
GetKeyState
CharUpperW
MessageBoxW
DestroyIcon
LoadIconW
GetCursorPos
SetWindowsHookExW
GetActiveWindow
DialogBoxParamW
GetSubMenu
TrackPopupMenu
LoadMenuW
GetWindowTextLengthW
RegisterWindowMessageW
FindWindowW
CreateDesktopW
DialogBoxIndirectParamW
LoadImageW
BringWindowToTop
SetForegroundWindow
GetSystemMetrics
ShowWindow
FillRect
ReleaseCapture
GetClassNameW
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
GetUpdateRect
ClientToScreen
CharNextW
GetSysColor
SetWindowContextHelpId
SendDlgItemMessageW
CreateWindowExW
MapDialogRect
DefWindowProcW
ChildWindowFromPoint
CopyRect
GetDlgItem
KillTimer
SetTimer
MoveWindow
PostMessageW
SendMessageW
GetQueueStatus
PeekMessageW
CallMsgFilterW
TranslateMessage
SetWindowLongW
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
GetParent
GetWindowLongW
EndDialog
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CharPrevW
CreateCaret
ShowCaret
HideCaret
SetCaretPos
MonitorFromPoint
DestroyMenu
CheckMenuItem
IsIconic
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
OpenProcessToken
CreateProcessAsUserW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ConvertSidToStringSidW
RegEnumValueW
RegNotifyChangeKeyValue
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
TraceEvent
RegDeleteValueW
ole32
CoCreateInstance
OleLockRunning
CoUninitialize
CoInitializeEx
StringFromGUID2
CoTaskMemAlloc
PropVariantClear
CoCreateGuid
CoTaskMemFree
CoTaskMemRealloc
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoInitialize
shell32
CommandLineToArgvW
SHChangeNotify
SHFileOperationW
Shell_NotifyIconW
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
oleaut32
CreateErrorInfo
SetErrorInfo
GetErrorInfo
VarUI4FromStr
VariantCopy
OleCreateFontIndirect
LoadTypeLi
LoadRegTypeLi
DispCallFunc
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
VariantChangeType
VariantClear
VariantInit
SysStringLen
SysAllocString
SysFreeString
shlwapi
SHStrDupW
PathRemoveFileSpecA
PathAppendA
PathRemoveFileSpecW
PathAppendW
PathFindFileNameW
PathCombineW
PathFileExistsW
SHDeleteKeyW
gdi32
CreateFontIndirectW
CreatePen
SaveDC
GdiFlush
TextOutW
GetTextExtentPoint32W
GetCharABCWidthsW
SetTextColor
SetBkMode
RoundRect
LineTo
MoveToEx
CreatePenIndirect
ExtTextOutW
SetBkColor
SetStretchBltMode
StretchBlt
CreateDIBSection
CombineRgn
CreateRoundRectRgn
ExtSelectClipRgn
CreateRectRgnIndirect
GetClipBox
SelectClipRgn
GetTextMetricsW
SetWindowOrgEx
Rectangle
DeleteObject
SelectObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
CreateSolidBrush
GetObjectW
GetStockObject
GetObjectA
RestoreDC
winmm
timeBeginPeriod
timeEndPeriod
timeGetTime
midiStreamClose
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
dbghelp
SymFunctionTableAccess64
SymSetOptions
SymInitialize
SymFromAddr
SymGetLineFromAddr64
SymGetModuleBase64
StackWalk64
ImageDirectoryEntryToData
psapi
QueryWorkingSet
GetProcessMemoryInfo
GetMappedFileNameW
comctl32
_TrackMouseEvent
ord17
gdiplus
GdiplusStartup
GdipAlloc
GdipFree
GdipDeleteBrush
GdipCreateLineBrushI
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipSetTextRenderingHint
GdipDeleteGraphics
GdipCreateFromHDC
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdiplusShutdown
GdipDrawString
GdipCloneBrush
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 380KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 173KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ