C:\Nonotaro\works\MarisaLand2\Release\6kinoko.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_f95d81a9f04cbbadc71a9e7d6ce56782_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_f95d81a9f04cbbadc71a9e7d6ce56782_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_f95d81a9f04cbbadc71a9e7d6ce56782_mafia
-
Size
1.1MB
-
MD5
f95d81a9f04cbbadc71a9e7d6ce56782
-
SHA1
fa68464385020d4ccecd3cec659833157dde9c6a
-
SHA256
177b3bb406dd45b93deb28fd7ceec60303a3572dc896c06353fe1c84913d5e9a
-
SHA512
900d315e94c77bf381446e5d363ec16cedb3130721605511bdb6ab6684ff2ceddfd0bffe00e59987b302def5ebbd5b7d5f0992551cba3cbe2ac694cd8784bc1d
-
SSDEEP
24576:2iLKS2MFIyB/VzD9CnAHag67yBaN8hPjJ4fh4OxQnU7paVy2nZceKKP7cpRZBD02:2+2qV65E8Tmn71Gt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-19_f95d81a9f04cbbadc71a9e7d6ce56782_mafia
Files
-
2024-04-19_f95d81a9f04cbbadc71a9e7d6ce56782_mafia.exe windows:5 windows x86 arch:x86
56ec5c0f7ce39d9a9d3512ffd84d3d86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateMutexA
GetLastError
GetModuleFileNameA
SetCurrentDirectoryA
GetStdHandle
SetEndOfFile
Sleep
CreateFileW
WriteConsoleW
FlushFileBuffers
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
LoadLibraryW
InterlockedExchange
GetConsoleMode
GetConsoleCP
WriteFile
GetFileSize
SetFilePointer
ReadFile
CreateFileA
GetProcessHeap
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
TryEnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
CreateEventA
SetThreadPriority
GetExitCodeThread
CreateThread
FindFirstFileA
FindClose
FindNextFileA
DecodePointer
EncodePointer
RtlUnwind
RaiseException
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
HeapFree
HeapReAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
GetModuleFileNameW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
SetStdHandle
user32
PostQuitMessage
SendMessageA
MessageBoxA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
CharPrevA
GetWindowRect
ToAscii
GetDC
ReleaseDC
GetSystemMetrics
SetWindowPos
GetWindowLongA
GetWindowInfo
CharLowerBuffA
CharNextA
SetWindowTextA
DispatchMessageA
DefWindowProcA
PeekMessageA
ShowCursor
TranslateMessage
GetMessageA
gdi32
GetGlyphOutlineA
CreateFontA
GetStockObject
DeleteObject
GetTextMetricsA
SelectObject
winmm
timeBeginPeriod
timeGetTime
d3dx9_33
D3DXCreateTexture
D3DXMatrixTranslation
D3DXMatrixScaling
D3DXMatrixMultiply
D3DXMatrixRotationYawPitchRoll
d3d9
Direct3DCreate9
imm32
ImmGetContext
ImmReleaseContext
ImmGetCompositionStringA
ImmSetCandidateWindow
ImmGetDefaultIMEWnd
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 847KB - Virtual size: 847KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ