C:\Builds\6\Branches\HSM_7.0\bin\HSM\PamHsmAs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_d693e8c2d07484de0028e6daeaee6ca7_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_d693e8c2d07484de0028e6daeaee6ca7_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_d693e8c2d07484de0028e6daeaee6ca7_mafia
-
Size
230KB
-
MD5
d693e8c2d07484de0028e6daeaee6ca7
-
SHA1
14550b2f2d25e13b740f19459761bee7f6140a52
-
SHA256
a47f37c36495726b39b768780aa4b1164c8dc07ec5494da6521a7e5d35988ec6
-
SHA512
3297442d529fb1dd937252f0d5dadc9dbf1ab4038c30fdf8f79d2a1035364856972ca24b469e14e1bc8a27d60bbb57a2cd4a202550d8f1dfc9ab20332ea80844
-
SSDEEP
3072:nbi5N69tYZROcT5zAKoRD5k5ocUo81vUTghvHyu3gKpLfX/Kso8A1Wcuxj:e769tmMcT5hGDOBCcT6vSu3VJPE/Zux
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-25_d693e8c2d07484de0028e6daeaee6ca7_mafia
Files
-
2024-02-25_d693e8c2d07484de0028e6daeaee6ca7_mafia.exe windows:5 windows x86 arch:x86
7b40e1cee4e05b2a8a7f867ebcb0e290
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeLibrary
MultiByteToWideChar
SizeofResource
FindResourceW
LoadLibraryExW
GetCommandLineW
LocalFree
GetOEMCP
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CloseHandle
CreateFileW
FlushFileBuffers
FormatMessageW
LocalAlloc
lstrcmpiW
InterlockedIncrement
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
GetCurrentThreadId
OutputDebugStringW
SetLastError
GetModuleHandleW
GetModuleFileNameW
LoadLibraryW
FindResourceExW
GetLastError
LoadResource
LockResource
IsValidCodePage
InterlockedDecrement
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
InterlockedExchange
SetConsoleCtrlHandler
FatalAppExitA
Sleep
HeapSize
HeapReAlloc
GetLocaleInfoW
GetStringTypeW
GetACP
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapDestroy
HeapCreate
GetCurrentThread
lstrlenA
WideCharToMultiByte
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapAlloc
HeapFree
DecodePointer
EncodePointer
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
user32
CharNextW
PostThreadMessageW
DispatchMessageW
GetMessageW
MessageBoxW
GetActiveWindow
wsprintfW
LoadStringW
advapi32
ControlService
DeleteService
CreateServiceW
ChangeServiceConfig2W
RegisterServiceCtrlHandlerW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
SetServiceStatus
RegisterEventSourceW
ReportEventW
DeregisterEventSource
OpenSCManagerW
OpenServiceW
CloseServiceHandle
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
StartServiceCtrlDispatcherW
ole32
CoTaskMemRealloc
CoRevokeClassObject
CoCreateInstance
CoRegisterClassObject
CoTaskMemFree
OleRun
StringFromGUID2
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoInitialize
CoTaskMemAlloc
oleaut32
CreateErrorInfo
SetErrorInfo
GetErrorInfo
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysStringLen
SysFreeString
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ