C:\DevelopAgent\outputLSP\release\Agent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_61de2ed706cffb218f80456542769022_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_61de2ed706cffb218f80456542769022_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_61de2ed706cffb218f80456542769022_mafia
-
Size
429KB
-
MD5
61de2ed706cffb218f80456542769022
-
SHA1
1c8a5d6e633d085a45e007b030002c38f5b8d698
-
SHA256
9f8b5fe4d676c1bbee4428e33f3505f73c9357fd1664cc6165a74be4bbea3643
-
SHA512
7598af9b0dd1295d64be49f63994482d94eac0c44ae02c3c7b51946fe9740ad4ef38b0486dfa0661914e5d57161eafda59e12d6a9d61011a59af51fbee2ccd6e
-
SSDEEP
12288:nipkpVmRmYr8gq/Kywb9rkzLAMFVNkkypXmM/ZCp:ipkpcRmO8gyuBrKLAMFskygM/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-14_61de2ed706cffb218f80456542769022_mafia
Files
-
2024-03-14_61de2ed706cffb218f80456542769022_mafia.exe windows:5 windows x86 arch:x86
439b79249409f99bb3531870e7a7110e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OutputDebugStringW
GetTempPathW
WaitForSingleObject
CreateEventW
GetTickCount
GetExitCodeProcess
GetWindowsDirectoryA
GetPrivateProfileIntW
GetPrivateProfileStringW
SetEvent
RaiseException
InitializeCriticalSectionAndSpinCount
FlushInstructionCache
GlobalAlloc
lstrlenW
lstrcmpiW
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
LoadLibraryExW
GlobalFree
GlobalHandle
CreateMutexW
GetLongPathNameW
lstrlenA
GetCommandLineW
WriteConsoleW
SetEnvironmentVariableA
CompareStringW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
HeapCreate
GetFileType
SetHandleCount
GetConsoleCP
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetTimeZoneInformation
GetVersionExW
MoveFileA
CreateThread
ExitThread
GetLocalTime
GetDateFormatW
GetTimeFormatW
MoveFileW
SystemTimeToFileTime
CreateProcessW
SetLastError
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
RemoveDirectoryW
DeleteFileW
Sleep
GetProcessHeap
HeapAlloc
HeapFree
GetCurrentProcessId
TerminateProcess
OpenProcess
GetCurrentProcess
IsWow64Process
GetModuleHandleW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
SetEndOfFile
GetLastError
FlushFileBuffers
CreateDirectoryW
GetFileAttributesW
GetSystemTimeAsFileTime
SetFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
FormatMessageW
LocalFree
WriteFile
CreateFileA
CreateFileW
GetFileSize
ReadFile
CloseHandle
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
EnterCriticalSection
GetCurrentThreadId
LocalFileTimeToFileTime
RtlUnwind
DecodePointer
EncodePointer
InterlockedExchange
GetStringTypeW
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetConsoleMode
user32
GetWindowLongW
DefWindowProcW
CharNextW
GetSysColor
SetWindowLongW
SetWindowPos
GetClientRect
ClientToScreen
ScreenToClient
MoveWindow
RegisterWindowMessageW
GetDC
ReleaseDC
InvalidateRgn
GetClassNameW
GetWindow
RedrawWindow
SetCapture
IsChild
GetParent
GetDlgItem
ReleaseCapture
FillRect
DestroyWindow
CallWindowProcW
EndPaint
BeginPaint
GetDesktopWindow
DestroyAcceleratorTable
SetFocus
UnregisterClassA
InvalidateRect
SetWindowContextHelpId
MapDialogRect
SendDlgItemMessageW
KillTimer
SetTimer
EndDialog
GetActiveWindow
DialogBoxIndirectParamW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
CreateAcceleratorTableW
CreateWindowExW
RegisterClassExW
LoadCursorW
GetClassInfoExW
IsWindow
SendMessageW
GetFocus
gdi32
BitBlt
GetStockObject
GetObjectW
CreateSolidBrush
GetDeviceCaps
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
advapi32
InitializeAcl
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
QueryServiceStatus
CloseServiceHandle
ConvertStringSidToSidW
RegQueryInfoKeyW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
OpenProcessToken
GetTokenInformation
LookupAccountSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetKernelObjectSecurity
RegGetKeySecurity
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
CopySid
AddAce
GetAce
SetSecurityDescriptorDacl
RegSetKeySecurity
OpenSCManagerW
OpenServiceW
RegCloseKey
shell32
SHGetFolderPathW
ShellExecuteExW
ole32
CoSetProxyBlanket
CoInitializeSecurity
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VarUI4FromStr
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysFreeString
VariantInit
VariantClear
SysAllocString
SysStringLen
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wininet
InternetQueryDataAvailable
HttpSendRequestW
HttpOpenRequestW
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetOpenW
InternetSetOptionW
HttpQueryInfoW
secur32
GetUserNameExW
iphlpapi
GetAdaptersInfo
gdiplus
GdiplusStartup
agentutil32
LoadIEConnectWindow
Sections
.text Size: 287KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ