D:\Ashish_EH_keylogger_Uploader\EHDevelopmentSolution_NonMFC\Release\wintasks.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_fb5919dca0b3e1c665a795163b720ef2_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-29_fb5919dca0b3e1c665a795163b720ef2_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_fb5919dca0b3e1c665a795163b720ef2_mafia
-
Size
171KB
-
MD5
fb5919dca0b3e1c665a795163b720ef2
-
SHA1
02d634771a52e4389fbbfebd6b898b2a391c9d59
-
SHA256
7d81641537bbd3ad0c875f75acfe17b6b96c0eadd64b76b9986e9e9d84faa742
-
SHA512
61885854641062efba9a3e0e009785594251cd6faa9a968f21e9d7233f7291dd9a215b590ab425c25dec237b50574297177bc43d434554c8ea30fb503d586211
-
SSDEEP
3072:5L7MhcguudR1XAVqyn2MeldE/6LBePpJqU:5Uhc5u31UqyoAQePps
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-29_fb5919dca0b3e1c665a795163b720ef2_mafia
Files
-
2024-03-29_fb5919dca0b3e1c665a795163b720ef2_mafia.exe windows:5 windows x86 arch:x86
5f835e9e370804c562fb557bda40d15c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetFileAttributesW
GetModuleFileNameW
DeleteFileW
CreateFileW
WriteFile
ReadFile
GetLastError
GetProcessId
GetCurrentProcess
CreateToolhelp32Snapshot
Process32NextW
OpenProcess
GetModuleHandleW
CreateMutexW
LoadLibraryW
GetProcAddress
FreeLibrary
CreateDirectoryW
CreateFileA
SetStdHandle
WriteConsoleW
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
FlushFileBuffers
GetFileAttributesW
SetEndOfFile
CloseHandle
SetFilePointer
GetConsoleMode
GetConsoleCP
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
WideCharToMultiByte
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapAlloc
LCMapStringW
MultiByteToWideChar
GetCPInfo
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
GetProcessHeap
user32
LoadStringW
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
DialogBoxParamW
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
advapi32
LookupAccountSidW
GetTokenInformation
OpenProcessToken
GetUserNameW
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ