D:\work\stcode\newDesktopIcon\bin\icon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_e7e414e5f0cb194758e25a7c92c501e3_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_e7e414e5f0cb194758e25a7c92c501e3_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_e7e414e5f0cb194758e25a7c92c501e3_mafia
-
Size
2.1MB
-
MD5
e7e414e5f0cb194758e25a7c92c501e3
-
SHA1
97ae4972353873fca706151da7be6041fee56b8e
-
SHA256
6b73fb7aa41cebaab9efb1a365b3694c215609f3b14e86aae9c0f4be4463306f
-
SHA512
4f86d5cd7c97e5bdf32e7c8bacbe1417a579284d575c55dea6f8712a306df33d20caf7ecca311ed43062a1e308d158077c7510546e5ac02bb3daf9a05dea7044
-
SSDEEP
49152:wN9+Tfyw1Qi4V4lDnBORn2+ZF5H+ZIT2DstgTFZpA1G6MtS0rQMYOQ+q8CQFyO:wN92QiAxT2DZoGjM0r1Qn
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-09_e7e414e5f0cb194758e25a7c92c501e3_mafia
Files
-
2024-04-09_e7e414e5f0cb194758e25a7c92c501e3_mafia.exe windows:6 windows x86 arch:x86
7ce7c6f0d829a707c2f8771fa62a0a98
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSectionEx
FindClose
RaiseException
LoadLibraryW
DecodePointer
GetProcAddress
DeleteCriticalSection
WideCharToMultiByte
SizeofResource
GetCurrentProcess
FindResourceA
GetModuleHandleA
LoadLibraryA
LockResource
LoadResource
GetModuleFileNameW
FreeLibrary
ExitProcess
HeapReAlloc
HeapAlloc
GetModuleHandleExW
GetStdHandle
FindNextFileW
GetCommandLineW
GetCommandLineA
CloseHandle
CreateFileA
GetLastError
Sleep
MultiByteToWideChar
CreateFileW
RtlUnwind
LoadLibraryExW
OutputDebugStringW
GetComputerNameW
WriteConsoleW
GetProcessHeap
FileTimeToSystemTime
FileTimeToLocalFileTime
GetProcessTimes
OpenProcess
Process32NextW
lstrcmpiW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
HeapSize
CreateDirectoryW
Process32FirstW
CreateToolhelp32Snapshot
GlobalFree
GlobalAlloc
GetFileAttributesExW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
WriteFile
FindFirstFileExW
ReadFile
GetFileSizeEx
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
EncodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
CompareStringW
HeapFree
user32
LoadStringA
MessageBoxA
advapi32
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
rpcrt4
UuidCreateSequential
wininet
InternetCheckConnectionW
HttpQueryInfoW
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
iphlpapi
GetAdaptersInfo
SendARP
ws2_32
socket
htons
connect
inet_addr
closesocket
getsockname
gethostbyname
Sections
.text Size: 181KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ