C:\Users\René Rebe\Documents\Visual Studio 2010\Projects\Xvas\objdir\Release\Xvas.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_9c5dfebbf6472ca8b76d65294600c691_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_9c5dfebbf6472ca8b76d65294600c691_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_9c5dfebbf6472ca8b76d65294600c691_mafia
-
Size
2.1MB
-
MD5
9c5dfebbf6472ca8b76d65294600c691
-
SHA1
d2c9b03030962709642bd79fcfda82b546137ccf
-
SHA256
28ae63a6f97ee58a2892b6eb7db4842688e25a52301d752e245107ad1cfa91c7
-
SHA512
687279e8c5f41bc64eadd71b2a8a85f5fec345e024bc5e838067466d4a9cf24433e08d7076d4c26867f2596565cb223153ad82221653d51e47dc280f3827e56d
-
SSDEEP
49152:E9oYA08efveodeUlIOgLI/uPyzKjuNr5CyQgwt2dS7nri0OgRncNsUT5aQFSaR:jsveodJIOgLI/uPyzKm9CyQgwteT0OgI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-25_9c5dfebbf6472ca8b76d65294600c691_mafia
Files
-
2024-02-25_9c5dfebbf6472ca8b76d65294600c691_mafia.exe windows:5 windows x86 arch:x86
a303574b2984ee710c8fec675b5f1fc7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FormatMessageA
GetModuleFileNameA
GetCurrentDirectoryW
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateDirectoryA
GetFullPathNameA
GetDriveTypeW
GetProcessHeap
SetEndOfFile
SetEnvironmentVariableA
SetEnvironmentVariableW
WriteConsoleW
SetStdHandle
GetTickCount
QueryPerformanceCounter
CompareStringW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetModuleHandleA
GetFileAttributesA
GetCurrentProcessId
CreateFileA
LoadLibraryW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetACP
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetModuleFileNameW
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
GetCurrentThreadId
Sleep
GetSystemTimeAsFileTime
LocalAlloc
CreateFileW
ReadFile
WriteFile
GlobalSize
SetFilePointer
CreatePipe
LoadLibraryA
GlobalFree
GetProcAddress
GlobalUnlock
GlobalAlloc
GlobalLock
FreeLibrary
LocalFree
CloseHandle
GetVersionExA
GetLastError
CreateProcessA
GetExitCodeProcess
WideCharToMultiByte
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
WaitForSingleObject
GetUserDefaultLCID
MulDiv
HeapCreate
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
RaiseException
GetCPInfo
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetDateFormatA
GetTimeFormatA
DeleteFileA
MoveFileA
GetCurrentProcess
DuplicateHandle
ExitProcess
GetModuleHandleW
RtlUnwind
HeapReAlloc
GetTimeZoneInformation
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindNextFileW
FindFirstFileExW
HeapAlloc
HeapFree
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
user32
RegisterClassW
ReleaseCapture
OpenClipboard
DispatchMessageA
CreateWindowExW
ShowWindow
CloseTouchInputHandle
DefWindowProcA
SetWindowLongW
EmptyClipboard
GetSystemMetrics
PeekMessageW
GetClipboardData
GetWindowLongA
GetWindowLongW
InvalidateRect
SetWindowLongA
GetTouchInputInfo
TranslateMessage
GetUpdateRect
UpdateWindow
SetClipboardData
LoadCursorA
SetWindowTextW
MoveWindow
GetDC
IsWindow
GetFocus
ReleaseDC
SetTimer
EndPaint
CloseClipboard
BeginPaint
ScreenToClient
GetWindowRect
GetMessageW
SetCapture
KillTimer
SetForegroundWindow
LoadIconA
GetClientRect
MessageBoxA
gdi32
GetDeviceCaps
GetTextMetricsA
CreateFontA
GetCurrentObject
DeleteObject
SelectObject
GetKerningPairsA
GetGlyphOutlineW
SetDIBitsToDevice
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
CryptHashData
RegCloseKey
CryptDestroyHash
CryptVerifySignatureA
RegOpenKeyExA
CryptCreateHash
RegQueryValueExA
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
CLSIDFromString
crypt32
CryptDecodeObjectEx
CryptStringToBinaryA
CryptImportPublicKeyInfo
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailA
ws2_32
getsockname
ntohs
htonl
inet_ntoa
gethostname
getpeername
setsockopt
__WSAFDIsSet
accept
listen
getsockopt
send
gethostbyname
gethostbyaddr
closesocket
socket
bind
recv
WSACleanup
sendto
shutdown
WSAGetLastError
select
recvfrom
WSAStartup
connect
ioctlsocket
htons
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 428KB - Virtual size: 428KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ