C:\Users\mate.klein\Documents\Visual Studio 2010\Projects\IBP\Projects\Bin\Release\CreateSupportZip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_b0bfb3aa217c33b5eeb1cae0ac0965c7_backswap_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-16_b0bfb3aa217c33b5eeb1cae0ac0965c7_backswap_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-16_b0bfb3aa217c33b5eeb1cae0ac0965c7_backswap_mafia
-
Size
986KB
-
MD5
b0bfb3aa217c33b5eeb1cae0ac0965c7
-
SHA1
1408ea7f0cf34ec3127d327e2790c714a6c9d271
-
SHA256
b09c5d6cd6ecfb96fb12f3618aff8d31651f5d7aa078a9e00aad56ad44f8203d
-
SHA512
540aec3add47b6dbe574ded0951f5b76482c2fd0604211801a80c00f0bfc0f09c25c511fa5b9edff4db0742bff61046eceb13032080e3e9c594d2b5b265f5c6f
-
SSDEEP
12288:oSW9SWNvzS/XZs2lHTr1vuwjmbXBLgaCmeHeTdYkS1MGObFSQamYVGJrc7MmBY:oSW9SWtSTr1vibRJrdYkVFxamoMrcm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-16_b0bfb3aa217c33b5eeb1cae0ac0965c7_backswap_mafia
Files
-
2024-03-16_b0bfb3aa217c33b5eeb1cae0ac0965c7_backswap_mafia.exe windows:5 windows x86 arch:x86
76ac672aa7b6362ce5a003a5fb10120b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLocaleInfoW
GetVersionExW
GetFileAttributesA
CreatePipe
GetFileAttributesExW
GetWindowsDirectoryW
CreateProcessW
GetCurrentProcessId
GetProcessHeap
SetEnvironmentVariableA
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
CreateToolhelp32Snapshot
GetModuleHandleA
Process32NextW
Process32FirstW
GetModuleFileNameW
TerminateProcess
GetProcAddress
FreeLibrary
GetCurrentThreadId
ReadFile
Sleep
GetLongPathNameW
GlobalFree
SetLastError
LocalFree
CloseHandle
FindNextFileW
DeviceIoControl
RemoveDirectoryW
FindClose
GetLastError
GetTempPathW
MultiByteToWideChar
CreateFileW
GetFileAttributesW
GetSystemTimeAsFileTime
SetEvent
WaitForSingleObject
GetCurrentProcess
CreateEventA
GetTickCount
WideCharToMultiByte
WriteFile
MoveFileExW
GetDriveTypeW
QueryPerformanceCounter
PeekNamedPipe
FlushFileBuffers
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
SetFilePointer
GetStartupInfoW
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
GetStdHandle
ExitProcess
HeapSize
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CompareStringW
FindFirstFileW
RtlUnwind
RaiseException
GetCPInfo
HeapSetInformation
GetCommandLineA
GetFileType
InitializeCriticalSectionAndSpinCount
SetStdHandle
HeapReAlloc
DeleteFileA
FindFirstFileExW
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapAlloc
GetDateFormatA
GetTimeFormatA
HeapFree
LoadLibraryA
LCMapStringW
LCMapStringA
GetStringTypeExA
GetUserDefaultLCID
FormatMessageA
AreFileApisANSI
GetFileInformationByHandle
GetCurrentDirectoryW
GetFullPathNameW
DeleteFileW
SetEndOfFile
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
InterlockedDecrement
LoadLibraryW
OpenProcess
GetModuleHandleW
SetHandleInformation
GetModuleFileNameA
InterlockedIncrement
user32
LoadStringA
GetSystemMetrics
gdi32
BitBlt
DeleteDC
CreateDCA
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetBitmapBits
advapi32
RevertToSelf
ImpersonateLoggedOnUser
LookupAccountSidW
GetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
shell32
ord680
SHGetFolderPathW
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
oleaut32
SysFreeString
VariantChangeType
VariantCopy
VariantClear
SysAllocString
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
userenv
GetUserProfileDirectoryW
GetProfilesDirectoryW
wininet
InternetOpenA
HttpOpenRequestA
InternetSetOptionW
InternetWriteFile
InternetReadFile
HttpSendRequestExW
InternetQueryOptionW
InternetConnectA
HttpQueryInfoA
InternetCloseHandle
HttpEndRequestW
InternetSetCookieA
HttpSendRequestA
HttpAddRequestHeadersA
winhttp
WinHttpReceiveResponse
WinHttpQueryOption
WinHttpSetCredentials
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSendRequest
WinHttpWriteData
WinHttpConnect
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpReadData
WinHttpGetProxyForUrl
WinHttpOpenRequest
WinHttpOpen
crypt32
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertCreateCertificateContext
CertOpenSystemStoreA
CertEnumCertificatesInStore
Sections
.text Size: 537KB - Virtual size: 537KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ