C:\Source\M5Server\RaMonitor\ReleaseMinDependency\RaMonitor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_7cda6986640474e46d6e2113373c9d70_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-28_7cda6986640474e46d6e2113373c9d70_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_7cda6986640474e46d6e2113373c9d70_mafia
-
Size
292KB
-
MD5
7cda6986640474e46d6e2113373c9d70
-
SHA1
ac6741b147b6ca2008cae0e03d7bfad62e204c99
-
SHA256
a9ca472ae7cf628d466dbf98e400eb503a10b5c834a000f846af9c9fd7c58d62
-
SHA512
68fbc0731f06f5c5b56687532407a20c4854709ad45e97e3eea4f623775b21573631afc331f3fd566fa3e998898473649a85c3583a7a88e8b6f86d8d0099bbe5
-
SSDEEP
6144:BCvs6GZm332SAlZa2gWvPK7D7/bAtTRR:0vGm332tlQ2gWvPqD7OR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-28_7cda6986640474e46d6e2113373c9d70_mafia
Files
-
2024-03-28_7cda6986640474e46d6e2113373c9d70_mafia.exe windows:5 windows x86 arch:x86
111ed1389fe9f52829d3af4a61172520
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
lstrcmpA
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentThreadId
SetLastError
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
Sleep
OutputDebugStringA
GetCommandLineA
LockResource
FindResourceW
GlobalFree
GlobalHandle
GetPrivateProfileIntA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FlushFileBuffers
CreateFileW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
SetConsoleCtrlHandler
FatalAppExitA
GetStringTypeW
LCMapStringW
GetSystemTimeAsFileTime
GetCurrentProcessId
EnterCriticalSection
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
HeapReAlloc
HeapDestroy
HeapCreate
GetModuleFileNameW
GetStdHandle
WriteFile
ExitProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualProtect
LocalFree
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
IsDBCSLeadByte
GetModuleHandleW
GetModuleFileNameA
CreateEventA
CreateThread
SetEvent
InterlockedIncrement
lstrcmpiA
lstrlenA
InterlockedDecrement
GetModuleHandleA
GetLastError
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
WaitForSingleObject
CloseHandle
CreateMutexA
GetTickCount
user32
SetWindowLongA
GetWindowLongA
EndDialog
DestroyWindow
KillTimer
SetTimer
GetDlgItem
SetDlgItemTextA
SendDlgItemMessageA
CharNextW
PostQuitMessage
CharNextA
PostThreadMessageA
UnregisterClassA
RegisterWindowMessageA
LoadImageA
GetSystemMetrics
CreateDialogIndirectParamA
MapDialogRect
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetMessageA
DispatchMessageA
CreateAcceleratorTableA
GetCursorPos
SetForegroundWindow
LoadMenuA
GetSubMenu
TrackPopupMenu
GetDialogBaseUnits
RegisterClassExA
LoadCursorA
GetClassInfoExA
IsWindow
GetDesktopWindow
SetFocus
GetFocus
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
FillRect
ReleaseCapture
GetClassNameA
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
MoveWindow
GetSysColor
DefWindowProcA
SendMessageA
GetParent
GetWindowRect
MonitorFromWindow
GetMonitorInfoA
GetClientRect
MapWindowPoints
SetWindowContextHelpId
MessageBoxA
GetWindow
ShowWindow
SetWindowPos
CreateWindowExA
gdi32
CreateSolidBrush
GetObjectA
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
GetStockObject
GetTextExtentPoint32A
GetAspectRatioFilterEx
BitBlt
GetDeviceCaps
advapi32
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
shell32
Shell_NotifyIconA
ole32
OleRun
OleUninitialize
OleInitialize
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
CreateErrorInfo
SysFreeString
LoadRegTypeLi
OleCreateFontIndirect
SysAllocString
SysAllocStringByteLen
SetErrorInfo
VariantChangeType
GetErrorInfo
VariantClear
VariantInit
SysAllocStringLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringByteLen
SysStringLen
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ