C:\DevelopAgent\outputLSP\release\Agent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_0087bd7dae261ca78397630ca3db9f83_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_0087bd7dae261ca78397630ca3db9f83_mafia.exe
Resource
win10v2004-20240319-en
General
-
Target
2024-04-10_0087bd7dae261ca78397630ca3db9f83_mafia
-
Size
305KB
-
MD5
0087bd7dae261ca78397630ca3db9f83
-
SHA1
3749074f065950f5afbd82c889200d93d4fd3ef3
-
SHA256
eab9b1ee27c139894597ffa73c43223ff992b7fb53780d536c9c3916edbb2d05
-
SHA512
4955c7d72395b9945fa8658e4e8118d4097fa895d5fcac900520fd5294f329082d2709536cfb59e83627f6ad889ef12d41e9c7d301fc8bf3ee8f7ce5149c6106
-
SSDEEP
6144:2LZqrzw99dWe1xv0mH4Lj8/kn02/cnCbYrTS80KGAEaV9/RaHw1OO/qbxmlo:2Lww99dZ1xMmBMn0+2Cx80KGMZ4HwU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-10_0087bd7dae261ca78397630ca3db9f83_mafia
Files
-
2024-04-10_0087bd7dae261ca78397630ca3db9f83_mafia.exe windows:5 windows x86 arch:x86
875381894e4723cd0484a72a36496990
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLastError
CreateProcessW
GetVersionExW
OutputDebugStringW
WaitForSingleObject
CreateEventW
GetTickCount
GetExitCodeProcess
SetEvent
RaiseException
InitializeCriticalSectionAndSpinCount
lstrlenW
lstrcmpiW
FlushInstructionCache
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryExW
CreateMutexW
GetLongPathNameW
lstrlenA
WriteConsoleW
SetEnvironmentVariableA
CompareStringW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
HeapCreate
GetFileType
SetHandleCount
GetConsoleMode
HeapAlloc
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetTimeZoneInformation
CreateThread
ExitThread
GetLocalTime
GetDateFormatW
GetTimeFormatW
Sleep
HeapFree
GetCurrentProcessId
OpenProcess
TerminateProcess
GetCurrentProcess
IsWow64Process
GetModuleHandleW
SetFilePointer
SetEndOfFile
FlushFileBuffers
GetLastError
GetSystemTimeAsFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
FormatMessageW
LocalFree
WriteFile
CreateFileA
CreateFileW
ReadFile
CloseHandle
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
EnterCriticalSection
GetCurrentThreadId
RtlUnwind
DecodePointer
EncodePointer
InterlockedExchange
GetStringTypeW
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
GetProcessHeap
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetConsoleCP
user32
FillRect
DestroyWindow
CallWindowProcW
EndPaint
ReleaseCapture
GetDlgItem
GetParent
BeginPaint
GetDesktopWindow
DestroyAcceleratorTable
UnregisterClassA
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
GetWindow
GetClassNameW
RegisterWindowMessageW
SetWindowLongW
GetWindowLongW
DefWindowProcW
CharNextW
GetSysColor
MoveWindow
SetWindowPos
GetClientRect
SetFocus
ReleaseDC
GetDC
ScreenToClient
GetFocus
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
CreateAcceleratorTableW
CreateWindowExW
RegisterClassExW
LoadCursorW
GetClassInfoExW
IsWindow
SendMessageW
ClientToScreen
gdi32
BitBlt
GetStockObject
GetObjectW
CreateSolidBrush
GetDeviceCaps
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
advapi32
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
QueryServiceStatus
CloseServiceHandle
RegQueryInfoKeyW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetKernelObjectSecurity
OpenSCManagerW
OpenServiceW
RegCloseKey
shell32
SHGetFolderPathW
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
OleLockRunning
CoInitializeEx
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoSetProxyBlanket
CoInitializeSecurity
OleInitialize
OleUninitialize
CoGetClassObject
CoUninitialize
CoCreateInstance
oleaut32
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysFreeString
VariantInit
VariantClear
SysAllocString
SysStringLen
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VarUI4FromStr
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wininet
HttpQueryInfoW
InternetReadFile
InternetQueryDataAvailable
HttpSendRequestW
InternetOpenW
InternetSetOptionW
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
iphlpapi
GetAdaptersInfo
gdiplus
GdiplusStartup
agentutil32
LoadIEConnectWindow
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ