C:\b\build\slave\Win\build\src\build\Release\chrome_exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_1b26725a9bd9619b07088c3f28eac1bd_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_1b26725a9bd9619b07088c3f28eac1bd_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_1b26725a9bd9619b07088c3f28eac1bd_mafia
-
Size
1.1MB
-
MD5
1b26725a9bd9619b07088c3f28eac1bd
-
SHA1
a660caa554c1b3f750f3cc610bde6e8f7e3493c0
-
SHA256
01cc74bb7e0838760c3947aa93090c3d53f930eae099a9690ed88479757f6117
-
SHA512
8918810632f3c371dc46180d8776acc22729be645066b43715c9884ce4e7da53adff32529d1b30b62f3aab7034512caea6bd44edeac50552a077363f64a78fb1
-
SSDEEP
24576:XdvTT6c+zDtzbpAMvAvwCTJ13TcCLKlXHZfXRRnT4PC:X/+3tzyMI/TPTcRdFXTUq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-28_1b26725a9bd9619b07088c3f28eac1bd_mafia
Files
-
2024-02-28_1b26725a9bd9619b07088c3f28eac1bd_mafia.exe windows:5 windows x86 arch:x86
e9ca594376673759cada710224d78578
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
kernel32
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
CreateFileW
GetSystemTimeAsFileTime
LocalFree
VirtualFree
SetFilePointer
ReadFile
GetSystemInfo
FreeLibrary
VirtualAlloc
GetCurrentProcessId
GetTickCount
ReleaseMutex
GetLastError
SetLastError
CreateMutexW
WriteFile
OutputDebugStringA
FormatMessageA
MultiByteToWideChar
WideCharToMultiByte
CreateEventW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
lstrlenW
GetUserDefaultLangID
InterlockedExchange
GetNativeSystemInfo
GetVersionExW
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThreadId
SetEndOfFile
FlushFileBuffers
UnmapViewOfFile
GetFileAttributesW
GetLongPathNameW
GetCurrentDirectoryW
MapViewOfFile
CreateFileMappingW
QueryDosDeviceW
OpenProcess
SetInformationJobObject
VirtualQueryEx
HeapSetInformation
GetStdHandle
GetProcessId
ResumeThread
AssignProcessToJobObject
SetHandleInformation
GetLocaleInfoW
GetUserDefaultUILanguage
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
RaiseException
CreateThread
RtlCaptureStackBackTrace
InterlockedExchangeAdd
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
GetSystemDirectoryW
GetWindowsDirectoryW
LocalAlloc
UnregisterWaitEx
RegisterWaitForSingleObject
GetQueuedCompletionStatus
CreateIoCompletionPort
PostQueuedCompletionStatus
InterlockedIncrement
ResetEvent
SetEvent
WaitForMultipleObjects
ReleaseSemaphore
VirtualQuery
RtlCaptureContext
InterlockedDecrement
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
WriteProcessMemory
VirtualAllocEx
GetThreadContext
VirtualFreeEx
VirtualProtectEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
SuspendThread
GetThreadLocale
GetACP
LoadLibraryA
CreateFileA
GetTimeZoneInformation
GetStringTypeW
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
SetStdHandle
GetFileType
HeapReAlloc
HeapAlloc
GetProcessHeap
RtlUnwind
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
WriteConsoleW
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
GetModuleHandleW
DuplicateHandle
SetCurrentDirectoryW
LoadLibraryExW
GetModuleFileNameW
GetTempPathW
GetEnvironmentVariableW
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
CreateRemoteThread
GetModuleHandleA
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
user32
GetUserObjectInformationW
GetThreadDesktop
CharUpperW
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
MessageBoxW
CloseDesktop
CloseWindowStation
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
advapi32
RegQueryValueExW
RegQueryInfoKeyW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
CreateProcessAsUserW
GetTraceEnableLevel
GetTraceEnableFlags
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
SetThreadToken
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RevertToSelf
RegDisablePredefinedCache
RegisterTraceGuidsW
TraceEvent
GetTraceLoggerHandle
UnregisterTraceGuids
Exports
Exports
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetExperimentList2
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
Sections
.text Size: 691KB - Virtual size: 691KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 367KB - Virtual size: 366KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ