H:\Venus2_refresh\build1313\SxS\src\Release\hpUrlLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_46028028f047444fb58623d13069d24f_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_46028028f047444fb58623d13069d24f_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_46028028f047444fb58623d13069d24f_mafia
-
Size
186KB
-
MD5
46028028f047444fb58623d13069d24f
-
SHA1
26ddf2e92a7d24c52bdae67fc6e13fca2871ceaf
-
SHA256
57855769a8396a3544c2ee1b5ea4068372fc1aade980629579b53d64df8b1020
-
SHA512
61c37d63acfaa71948d12d6a046dfc677cd154f3026160e32aac282e95c5940b2b836e6581fdefaf95169c2c2005cdcaad582edec7f2eda131b8df4fa9b3b3e5
-
SSDEEP
3072:nqXw8vdwyIZst4ENJrL/K3Jqp+GnLuadt7IBS4wO1Y0MeHesY4Ej:nSxdb4YtNdLyEpfLuadtUS4QaHBY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-06_46028028f047444fb58623d13069d24f_mafia
Files
-
2024-03-06_46028028f047444fb58623d13069d24f_mafia.exe windows:5 windows x86 arch:x86
2306b8b15ffeb1baff6bc424634f6c2c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetKeyState
SendMessageCallbackW
GetMessageW
SetTimer
RegisterWindowMessageW
DestroyIcon
LoadIconW
MsgWaitForMultipleObjectsEx
WaitForInputIdle
GetAsyncKeyState
OpenWindowStationW
CloseWindowStation
GetProcessWindowStation
SetProcessWindowStation
GetThreadDesktop
SetThreadDesktop
OpenDesktopW
CloseDesktop
ExitWindowsEx
AllowSetForegroundWindow
PeekMessageW
MsgWaitForMultipleObjects
GetSystemMetrics
SystemParametersInfoW
wsprintfW
shlwapi
PathIsFileSpecW
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
psapi
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
kernel32
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTickCount
CreateFileW
Sleep
SetFilePointer
WriteFile
CloseHandle
OutputDebugStringW
GetCurrentThreadId
QueryPerformanceCounter
OpenProcess
GetFileAttributesExW
GetCommandLineW
GetTempFileNameW
GetLongPathNameW
SearchPathW
FormatMessageW
LocalFree
CreateMutexW
WaitForSingleObject
CreateFileMappingW
MapViewOfFile
ReleaseMutex
UnmapViewOfFile
SetLastError
LoadLibraryW
GetProcAddress
FreeLibrary
QueryPerformanceFrequency
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
HeapFree
GetSystemTimeAsFileTime
GetTimeFormatW
GetDateFormatW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
GetModuleHandleW
ExitProcess
IsProcessorFeaturePresent
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapCreate
GetTimeZoneInformation
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
WriteConsoleW
SetStdHandle
CompareStringW
SetEnvironmentVariableA
GetCurrentProcessId
InitializeCriticalSection
ExpandEnvironmentStringsW
GetModuleFileNameW
GetLastError
GlobalFree
GlobalUnlock
GlobalLock
ProcessIdToSessionId
GlobalAlloc
LocalAlloc
GetUserDefaultLangID
SetCurrentDirectoryW
GetCurrentDirectoryW
GetComputerNameExW
DeleteFileW
FindClose
FindNextFileW
ExitThread
SetFileAttributesW
CopyFileW
MoveFileExW
FindFirstFileW
GetSystemDefaultUILanguage
GetSystemDefaultLCID
FlushViewOfFile
OpenFileMappingW
GlobalMemoryStatusEx
GetSystemDirectoryW
DeviceIoControl
GetFileTime
SizeofResource
LockResource
LoadResource
GetVersionExW
CreateProcessW
GetTempPathW
GetDiskFreeSpaceExW
CreateThread
GetExitCodeThread
GetExitCodeProcess
TerminateThread
CreateEventW
OpenEventW
ResetEvent
SetEvent
GetLocalTime
GetSystemTime
GetFileAttributesW
OpenMutexW
CreateDirectoryW
GetShortPathNameW
GetFileSizeEx
PeekNamedPipe
GetEnvironmentVariableW
TryEnterCriticalSection
WaitForMultipleObjects
CreatePipe
FindResourceW
advapi32
RegCloseKey
CheckTokenMembership
OpenProcessToken
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
GetUserNameW
RegOpenKeyExW
RegEnumKeyExW
shell32
SHGetSpecialFolderPathW
ExtractIconW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CLSIDFromString
oleaut32
SysFreeString
SysAllocString
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
secur32
GetUserNameExW
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ