C:\code\dreamworks\src\DreamWifi\output\bin32\pdb\jsupdate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_90ac5826294885e95eca3870a2bb7531_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_90ac5826294885e95eca3870a2bb7531_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_90ac5826294885e95eca3870a2bb7531_mafia
-
Size
390KB
-
MD5
90ac5826294885e95eca3870a2bb7531
-
SHA1
d70aea3366655866576d785646d76f7bc52f6104
-
SHA256
94fa3e277f27c630dd212a89f053f7fcd2c52fabd36dc488da46ebffade90c9a
-
SHA512
0a389b881e054cfe7a1057dfb4b8f36a959152ed9213439154afdf79afd7b7bf2d27aeea7b69a452d2b67d30cf096e9ae2bb83db2e1528b7a086b4b4733aa510
-
SSDEEP
6144:hqb0nXnBbSY92bOSBwWNb3ZqxRJ0D5WGTxdUH27lOZd3:hrpSYAKSBwWnwRJ07dk2OJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-12_90ac5826294885e95eca3870a2bb7531_mafia
Files
-
2024-03-12_90ac5826294885e95eca3870a2bb7531_mafia.exe windows:5 windows x86 arch:x86
90ae950974462bd7ab61304e5e3cd7a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FlushInstructionCache
GetCurrentProcess
CloseHandle
GetCurrentThreadId
SetLastError
WritePrivateProfileStringW
WaitForSingleObject
OpenProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateMutexW
lstrlenW
GetProcAddress
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
GetTempPathW
GetPrivateProfileIntW
LocalFree
GetCommandLineW
DeviceIoControl
GetFileSize
CreateFileW
CreateDirectoryW
GetVersionExW
GetVersion
GetFileAttributesW
GetVolumeInformationW
Sleep
GetPrivateProfileStringW
ExpandEnvironmentStringsW
GlobalFree
GlobalAlloc
GetTickCount
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
GetConsoleMode
GetStdHandle
WriteFile
ExitProcess
LeaveCriticalSection
RaiseException
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
EncodePointer
GetSystemTimeAsFileTime
DecodePointer
RtlUnwind
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
MoveFileExW
CopyFileW
MultiByteToWideChar
WideCharToMultiByte
SizeofResource
DeleteFileW
GetLastError
FindResourceExW
FindResourceW
LoadResource
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
FlushFileBuffers
SetStdHandle
WriteConsoleW
HeapAlloc
HeapDestroy
HeapCreate
EnterCriticalSection
IsValidLocale
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
SetFilePointer
GetConsoleCP
LoadLibraryW
LockResource
GetStringTypeW
EnumSystemLocalesA
user32
DefWindowProcW
CreateDialogParamW
CharNextW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
UnregisterClassA
FindWindowW
GetWindowThreadProcessId
PostMessageW
GetActiveWindow
DialogBoxParamW
EndDialog
PostQuitMessage
GetSystemMetrics
LoadImageW
MessageBoxW
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
SendMessageW
KillTimer
SetTimer
IsWindowVisible
SetWindowTextW
GetWindowLongW
SetWindowLongW
DestroyWindow
advapi32
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
shell32
ShellExecuteExW
CommandLineToArgvW
ole32
CoUninitialize
CoTaskMemAlloc
CoInitialize
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
LoadTypeLi
LoadRegTypeLi
SysStringLen
VarUI4FromStr
shlwapi
PathFindFileNameW
StrToIntW
PathFindExtensionW
SHSetValueW
comctl32
InitCommonControlsEx
jscore
?IsFileExist@File@Util@@YAHPA_W@Z
?GetService@Service@Util@@YAJABU_GUID@@PAPAX@Z
?GetMD5@File@Util@@YAJPA_WPAPA_W@Z
?GetExeDir@File@Util@@YA?AV?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@XZ
?MakeDirsEx@File@Util@@YAJPA_W@Z
?GetFileVersion@File@Util@@YAHPA_WPAPA_WH@Z
?CreateInstanceFromClassFactory@@YAJABU_GUID@@PAPAXPAUIUnknown@@@Z
setupapi
SetupIterateCabinetW
urlmon
URLDownloadToFileW
wininet
DeleteUrlCacheEntryW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ