E:\workspace\bre-maya-2014ext-w7\build\Release\runTime\bin\quicktimeShim.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_ae555a9da623300d2500294b097dc457_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_ae555a9da623300d2500294b097dc457_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_ae555a9da623300d2500294b097dc457_mafia
-
Size
384KB
-
MD5
ae555a9da623300d2500294b097dc457
-
SHA1
d6f187692181eaf627959ef4941fa09ae4bcda1c
-
SHA256
7a38a842e797a6682f1f499c4279d110b45b0cfcbcfc8dfc2507dd1d917c9dbc
-
SHA512
63130433e63d00bfadb2bc594bcadad3670255ad68c3be20fbe020e7069cb4a6dd02790299608e2ea8373a5704dbd34f326589606f25a89c126120aa4a759254
-
SSDEEP
12288:RFc0jvmKhGsXT6bfxhvdhllEQnwrKzDmr:RwdsXT6bfH4QnxGr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-10_ae555a9da623300d2500294b097dc457_mafia
Files
-
2024-03-10_ae555a9da623300d2500294b097dc457_mafia.exe windows:5 windows x86 arch:x86
d3d7c76b9d53a847982000da4c06f18e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
gdi32
GetDIBits
GetObjectA
user32
wsprintfA
kernel32
GetProcessHeap
CreateFileW
LCMapStringW
SetEndOfFile
WriteConsoleW
FlushFileBuffers
CloseHandle
MapViewOfFile
CreateFileMappingA
FormatMessageA
GetLastError
ReadFile
PeekNamedPipe
WaitForSingleObject
SetEvent
WriteFile
UnmapViewOfFile
Sleep
OpenEventA
CreateFileA
LoadLibraryA
GlobalFree
GlobalAlloc
FreeLibrary
GetModuleFileNameA
GetProcAddress
ReleaseMutex
CreateMutexA
GetCurrentProcessId
GetSystemDirectoryA
GetModuleHandleA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
RtlUnwind
RaiseException
GetCommandLineA
HeapSetInformation
GetFileAttributesA
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetCurrentThread
ExitProcess
InitializeCriticalSectionAndSpinCount
FatalAppExitA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
GetLocaleInfoW
HeapReAlloc
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetConsoleCtrlHandler
SetFilePointer
GetConsoleCP
GetConsoleMode
CompareStringW
SetEnvironmentVariableA
LoadLibraryW
SetStdHandle
Sections
.text Size: 329KB - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ