J:\hd_dev\newhd\updater\updater\Bin\Release\WmglUpdate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_52484026d70766ab71418bc5426c27a7_mafia.exe
Resource
win7-20240220-en
General
-
Target
2024-04-19_52484026d70766ab71418bc5426c27a7_mafia
-
Size
2.1MB
-
MD5
52484026d70766ab71418bc5426c27a7
-
SHA1
917e81713484a389429abb6d406ad3aa894d3cfc
-
SHA256
5b4bac0439f9de37e3c6c001eccd412a0929c8dec3e258dfa8ec1be227e09e06
-
SHA512
2cbcfc31a603f84af1b70057f85617281de8f8524787452a2e0b34485b9bb1f1cb637a39862353feb890383bf04546e5732df66b69d4b4f6d2abcc15bd6fe6ea
-
SSDEEP
49152:EzgYo/SlqhYTUiz6gaZ4T5tDo42BkJcCDHUPfVtgTYbg8upGyH8irDmg27RnWGj:YgYo/SlqhYZz6gto42BkJcCDH6fVtgT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-19_52484026d70766ab71418bc5426c27a7_mafia
Files
-
2024-04-19_52484026d70766ab71418bc5426c27a7_mafia.exe windows:5 windows x86 arch:x86
64bd03d2198154239a3791c83399df00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryW
FreeLibrary
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
SetFileAttributesW
GetModuleHandleW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetCurrentProcessId
OpenProcess
DuplicateHandle
RaiseException
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
HeapAlloc
GetProcessHeap
HeapFree
OpenEventW
FlushInstructionCache
SetLastError
FlushViewOfFile
FileTimeToSystemTime
GetFileTime
SetFilePointerEx
GetFileSizeEx
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
SetStdHandle
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
VirtualQuery
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileSize
GetStringTypeW
GetFileType
GetStdHandle
SetHandleCount
HeapDestroy
HeapCreate
HeapSize
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentProcess
GetProcessId
GetCurrentThreadId
TerminateThread
SetFileTime
WriteFile
GetFileAttributesW
LocalFileTimeToFileTime
MoveFileExW
SystemTimeToFileTime
ReadFile
SetFilePointer
CreateFileW
GetTickCount
DeviceIoControl
CreateFileA
IsValidCodePage
GetOEMCP
GetACP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
ExitProcess
GetSystemTimeAsFileTime
CreateThread
ExitThread
DecodePointer
GlobalMemoryStatusEx
GetDiskFreeSpaceExW
EncodePointer
InterlockedExchange
GetProfileIntA
MulDiv
GlobalSize
VirtualQueryEx
WriteProcessMemory
VirtualProtectEx
IsBadCodePtr
lstrcmpW
FreeResource
GlobalLock
GlobalUnlock
WritePrivateProfileStringW
lstrcpyW
FindResourceExW
LockResource
IsBadReadPtr
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
GetDriveTypeW
GlobalFree
GlobalAlloc
GetVersionExW
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetLocalTime
ResetEvent
WaitForSingleObject
SetEvent
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetLocaleInfoW
GetUserDefaultUILanguage
MultiByteToWideChar
GetPrivateProfileStringW
GetPrivateProfileIntW
CreateDirectoryW
lstrlenA
OutputDebugStringW
DebugBreak
CloseHandle
CreateEventW
InterlockedCompareExchange
GetLastError
CreateProcessW
InterlockedIncrement
GetModuleFileNameW
lstrlenW
CopyFileW
Sleep
GetCurrentDirectoryW
DeleteFileW
InterlockedDecrement
user32
GetAsyncKeyState
TrackPopupMenu
GetDoubleClickTime
GetDesktopWindow
GetSysColor
RegisterClipboardFormatW
SetCaretPos
FrameRect
GetDlgItem
GetKeyState
InflateRect
ShowCaret
HideCaret
CreateCaret
SetCursor
MsgWaitForMultipleObjects
wsprintfW
CreateDialogParamW
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
MessageBoxW
DestroyWindow
InvalidateRect
SetWindowTextW
MoveWindow
SetFocus
IsWindowEnabled
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
IsWindowVisible
IsIconic
PostQuitMessage
ShowWindow
SetWindowLongW
SetTimer
KillTimer
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
SetForegroundWindow
GetCursorInfo
SendMessageW
GetSystemMetrics
LoadImageW
IsDialogMessageW
SetWindowPos
PostMessageW
IsWindow
CharNextW
LoadStringW
UnregisterClassA
CreateWindowExW
GetClassLongW
ReleaseCapture
TrackMouseEvent
GetAncestor
GetFocus
SetActiveWindow
CallWindowProcW
GetLayeredWindowAttributes
SetWindowsHookExW
RegisterClassExW
LoadCursorW
ValidateRect
GetCapture
EqualRect
SetClassLongW
ScreenToClient
GetCursorPos
SetCapture
ClientToScreen
CallNextHookEx
PtInRect
ReleaseDC
GetDC
WindowFromPoint
CopyRect
SetRect
OffsetRect
IntersectRect
UnionRect
SetLayeredWindowAttributes
GetNextDlgTabItem
SetWindowRgn
WindowFromDC
EndPaint
BeginPaint
UpdateWindow
RedrawWindow
SetParent
SetMenu
UpdateLayeredWindow
GetActiveWindow
GetClassInfoExW
MonitorFromPoint
SystemParametersInfoW
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
OpenProcessToken
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
GetTokenInformation
LookupPrivilegeNameW
RegQueryValueExW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHCreateDirectoryExW
ord74
DragQueryFileW
ShellExecuteW
ole32
OleUninitialize
RegisterDragDrop
RevokeDragDrop
CreateStreamOnHGlobal
CoCreateGuid
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
ReleaseStgMedium
OleDuplicateData
OleSetContainedObject
CoUninitialize
CoInitializeEx
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
OleInitialize
oleaut32
VarUI4FromStr
shlwapi
StrStrIW
PathFileExistsW
wnsprintfW
PathIsDirectoryW
comctl32
InitCommonControlsEx
psapi
GetMappedFileNameW
winhttp
WinHttpCrackUrl
WinHttpSetStatusCallback
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpQueryOption
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpReadData
WinHttpCloseHandle
iphlpapi
GetAdaptersInfo
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
gdiplus
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapLockBits
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateBitmapFromScan0
GdipCloneImage
GdipDisposeImage
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipSaveImageToFile
GdipDrawImageRectI
GdipFillRectangleI
GdipDrawRectangleI
GdipDeleteGraphics
GdipCreateFromHDC
GdipDeletePen
GdipCreatePen1
GdipAlloc
GdipFree
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdiplusShutdown
GdiplusStartup
GdipBitmapUnlockBits
winmm
timeSetEvent
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
riched20
ord4
gdi32
GetBkMode
SetStretchBltMode
SetDIBitsToDevice
GetObjectW
GetCurrentObject
DeleteDC
CreateCompatibleDC
GetTextExtentExPointW
GetDeviceCaps
ExtSelectClipRgn
ExcludeClipRect
GetStockObject
GdiSetBatchLimit
GetTextMetricsW
GetClipBox
GetTextExtentPoint32W
SetTextColor
SetBkMode
TextOutW
CreateFontIndirectW
SelectClipRgn
CreateRectRgn
CombineRgn
CreatePen
SelectObject
MoveToEx
LineTo
DeleteObject
SetBkColor
ExtTextOutW
BitBlt
CreateDIBSection
msimg32
TransparentBlt
AlphaBlend
Exports
Exports
??0CSafeCrtBuffer@sonic_ui@@QAE@ABV01@@Z
??0CSafeCrtBuffer@sonic_ui@@QAE@XZ
??1CSafeCrtBuffer@sonic_ui@@UAE@XZ
??2CSafeCrtBuffer@sonic_ui@@SAPAXI@Z
??2CSafeCrtBuffer@sonic_ui@@SAPAXIPBDH@Z
??3CSafeCrtBuffer@sonic_ui@@SAXPAX@Z
??4CSafeCrtBuffer@sonic_ui@@QAEAAV01@ABV01@@Z
??_7CSafeCrtBuffer@sonic_ui@@6B@
??_UCSafeCrtBuffer@sonic_ui@@SAPAXI@Z
??_VCSafeCrtBuffer@sonic_ui@@SAXPAX@Z
GetSonicUI
Sections
.text Size: 906KB - Virtual size: 906KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 434KB - Virtual size: 434KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 628KB - Virtual size: 632KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE