C:\oobe\3.2\c3p0\dev\target\win\Release\AAMUpdatesNotifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_fa711337eb219a5dc7401074a76f8da5_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_fa711337eb219a5dc7401074a76f8da5_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_fa711337eb219a5dc7401074a76f8da5_mafia
-
Size
1.8MB
-
MD5
fa711337eb219a5dc7401074a76f8da5
-
SHA1
1be1b0f5d30fcca256e3cfaf0f6ae9c93b17ed9b
-
SHA256
d0f2524ab6ee6c4cf631c9153d95d83e21867efb304ef4d0b238449cb4d94124
-
SHA512
69473e7e8c53110d54ae73c13ecb0f8a1ce34006d784a4dcee40941d8dd42e4c477fdb0a0c36a5de40a690573a567d0e5b06430f8f5bee42892c78420771fc8d
-
SSDEEP
24576:20XDVrSe89cVFZbevPPO15qaMbNW2isv/G:20zVrKCPZqW3ORW2iS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-23_fa711337eb219a5dc7401074a76f8da5_mafia
Files
-
2024-02-23_fa711337eb219a5dc7401074a76f8da5_mafia.exe windows:5 windows x86 arch:x86
74ff3bd00cddc52e103da8d116c7aafd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DefWindowProcW
DestroyMenu
UpdateWindow
SendMessageW
MessageBoxW
InsertMenuW
CreateWindowExW
CreatePopupMenu
wsprintfW
EndPaint
DestroyWindow
TranslateAcceleratorW
GetMessageW
PostQuitMessage
TrackPopupMenu
PostMessageW
SetForegroundWindow
LoadCursorW
BeginPaint
TranslateMessage
LoadAcceleratorsW
RegisterClassExW
LoadIconW
GetCursorPos
DispatchMessageW
ole32
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
OleRun
CoInitialize
oleaut32
GetErrorInfo
SysFreeString
SysAllocString
shlwapi
PathFileExistsW
PathRemoveFileSpecW
kernel32
GetTickCount
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InterlockedDecrement
QueryPerformanceCounter
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetStdHandle
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
HeapCreate
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
GetConsoleMode
GetConsoleCP
HeapSize
IsProcessorFeaturePresent
WaitForSingleObject
GetLastError
GetCurrentThreadId
CloseHandle
SetEvent
CreateEventW
WaitForMultipleObjects
CreateThread
GetDateFormatW
Sleep
GetTimeFormatW
GetLocalTime
GetSystemDefaultLangID
CreateProcessW
WriteFile
WideCharToMultiByte
ReadFile
GetModuleFileNameW
CreateFileW
MultiByteToWideChar
FlushFileBuffers
GetTempPathW
SetLastError
LocalAlloc
GetUserDefaultUILanguage
LocalFree
lstrlenA
InterlockedIncrement
ExitProcess
ReleaseSemaphore
CreateSemaphoreW
OpenSemaphoreW
GetCurrentProcessId
SetFilePointer
CreateDirectoryW
FreeLibrary
LoadLibraryW
GetProcAddress
IsDBCSLeadByteEx
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
GetModuleHandleW
IsDebuggerPresent
advapi32
SetSecurityDescriptorDacl
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
FreeSid
shell32
Shell_NotifyIconW
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE