C:\Builds\187\RPK\RPK Tools v3.5 Beta 1\Binaries\Win32\Release\RPKDriverInst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_341acb46a04165c4c73b0f75d649e89b_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_341acb46a04165c4c73b0f75d649e89b_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-10_341acb46a04165c4c73b0f75d649e89b_mafia
-
Size
197KB
-
MD5
341acb46a04165c4c73b0f75d649e89b
-
SHA1
f272bc92d3a4ed7cd179e7e8161e0274090f308b
-
SHA256
4a594528c4f3022e43309b31bfca766a059a859a48b9853bf9acb91af7854831
-
SHA512
d15a9e7ef0944e0e233271196bf01cdf1bb94b668296b54c240fcd2c3c449450e7faa80736f49f9b2740583d5a04f345a9bea18274a22a3fe951dcc3ee99d7d0
-
SSDEEP
6144:Ry6KlSY/q3FePc1+fUTIJ2wNXvwd1/JLTB:RFpY/q3IO+fUT6Xv61/J5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-10_341acb46a04165c4c73b0f75d649e89b_mafia
Files
-
2024-03-10_341acb46a04165c4c73b0f75d649e89b_mafia.exe windows:5 windows x86 arch:x86
b4fdc1c8be82a717a9fc5116b4ae03ec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
setupapi
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiGetDeviceInfoListDetailW
SetupDiGetDeviceRegistryPropertyW
newdev
UpdateDriverForPlugAndPlayDevicesW
kernel32
GetProcessHeap
WriteConsoleW
SetStdHandle
LoadLibraryW
IsValidLocale
GetDriveTypeW
FindResourceExW
FindResourceW
LoadResource
CreateProcessW
GetLogicalDriveStringsW
GetLogicalDrives
Sleep
SizeofResource
GetExitCodeProcess
CreateFileW
LockResource
DeviceIoControl
CloseHandle
GetLastError
LocalAlloc
LocalFree
FindFirstFileW
FindClose
FindNextFileW
GetPrivateProfileSectionW
GetModuleFileNameW
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
InitializeCriticalSectionAndSpinCount
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
SetEndOfFile
GetCPInfo
CreateDirectoryW
GetLocalTime
GetCommandLineW
HeapSetInformation
RtlUnwind
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
HeapCreate
ExitProcess
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
user32
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjects
shell32
SHFileOperationW
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ