C:\Users\Desktop\Project1\Release\Project1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_156cd53bc5d2472d6f609f956c99351f_mafia.exe
Resource
win7-20240221-en
General
-
Target
2024-03-13_156cd53bc5d2472d6f609f956c99351f_mafia
-
Size
2.4MB
-
MD5
156cd53bc5d2472d6f609f956c99351f
-
SHA1
524ebcf9e029dd6e43d8d1b81ee84476cbad0270
-
SHA256
9b09bfe79653270e1c6248815996b4710d1c3e7a2b64dfa221d953369963ea03
-
SHA512
a9db7823bdaf4816ad40bae933fd57dc876514793d2fc4e03bc5e18f4b14dcd3a882a5878708a0bfc34171c77c6f24fb6ad218e67f77c2804730a72230cc438b
-
SSDEEP
12288:/k1MoO3MBURL+8hiLzq5ot1tLA9BqgiyUDHXQsHvBqgiyUDHD7ApBERoMsqQAmQw:qML3Ga0HqQNyUD3NHvQNyUDjwBQWEmD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-13_156cd53bc5d2472d6f609f956c99351f_mafia
Files
-
2024-03-13_156cd53bc5d2472d6f609f956c99351f_mafia.exe windows:5 windows x86 arch:x86
d86a460235c5656ceabc27c59fa02ceb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
GetEnvironmentVariableA
MultiByteToWideChar
FindFirstFileA
GetProcAddress
VirtualAlloc
CopyFileA
SetFileAttributesA
GetTempFileNameA
VirtualQuery
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
CloseHandle
GetTempPathA
CreateThread
SetEndOfFile
CreateFileW
FindClose
ExitProcess
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
GetModuleHandleW
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryW
WideCharToMultiByte
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetModuleFileNameW
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetStdHandle
WriteConsoleW
CreateFileA
GetProcessHeap
shell32
ShellExecuteA
comdlg32
ChooseColorA
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
phgGGG Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 8KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ