C:\Users\slimh\Downloads\III FunctionalTest\Release\FuncTest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_ab5f48a6bb41baba7d066ad698228409_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-22_ab5f48a6bb41baba7d066ad698228409_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_ab5f48a6bb41baba7d066ad698228409_mafia
-
Size
441KB
-
MD5
ab5f48a6bb41baba7d066ad698228409
-
SHA1
99a91b21237d5cb4f67a7f7fd9af49bb64cf9cfc
-
SHA256
4f687181d91a6bf9f11eecac687b7cbf7bec80e55c2b52a678f98e4d35f0ef0e
-
SHA512
3ae02c3d65a9b7536cab127fb1a08d33d7285cd3f6c0dafd96a73709dbd780692667f6d3924c3936e8825d79a4608d89e4a2da0dc6cddc8693baac4bd028aa18
-
SSDEEP
12288:ElZlx9nopuv7Acb1bQMX/BKFDq8ZTLuu+cUat21TV0AD7cSB0O1i8d6BDh/INq48:E7lk7lvGynOQek
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-22_ab5f48a6bb41baba7d066ad698228409_mafia
Files
-
2024-02-22_ab5f48a6bb41baba7d066ad698228409_mafia.exe windows:5 windows x86 arch:x86
56d172bc420b6e1ec53dd3313762fc7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
FormatMessageA
WideCharToMultiByte
MultiByteToWideChar
GetACP
GetStdHandle
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
FlushConsoleInputBuffer
Sleep
GetLocalTime
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CreateFileW
CreateFileA
LoadLibraryW
WriteConsoleW
SetStdHandle
IsValidLocale
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetSystemTime
GetSystemTimeAsFileTime
CloseHandle
CreateProcessA
DuplicateHandle
GetCurrentProcess
HeapFree
RaiseException
RtlUnwind
GetCommandLineA
HeapSetInformation
LCMapStringW
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetTimeZoneInformation
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
GetFileAttributesA
SetHandleCount
GetFileType
GetStartupInfoW
CreatePipe
GetExitCodeProcess
WaitForSingleObject
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetProcAddress
GetModuleHandleW
ExitProcess
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ReadFile
SetFilePointer
GetOEMCP
IsValidCodePage
HeapSize
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeW
GetLocaleInfoW
HeapReAlloc
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
GetProcessHeap
agvisa32
ord142
ord141
ord139
ord135
ord131
ord134
ord267
ord136
ord140
ord132
ord269
ord271
ord260
ord202
ord203
ord133
ord259
wsock32
WSAStartup
socket
ioctlsocket
htons
connect
send
recv
closesocket
WSACleanup
WSAGetLastError
Sections
.text Size: 341KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ