H:\Venus1\build_src\build1929\SxS\src\Release\hpUrlLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_6a50a7a5dcd3375047cbbaa88d4c7c9a_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_6a50a7a5dcd3375047cbbaa88d4c7c9a_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-20_6a50a7a5dcd3375047cbbaa88d4c7c9a_mafia
-
Size
186KB
-
MD5
6a50a7a5dcd3375047cbbaa88d4c7c9a
-
SHA1
e78a907c4c0c3a566cf3c8f06b664214d745c931
-
SHA256
930ae262a15d90a989bc88f32721676ec6c1c00035b75e278814a88f288e28b2
-
SHA512
7c32a3760cdbd5e2edf226aecaf82630285fe4f79c3a4453e52ac6d44821004a5abc54c787a1bd84f6c88818b31722ddc5cdb417e5043cca6f3d58b1c9fb369f
-
SSDEEP
3072:hDNIurOPno2OpD5Z+d+Vvt+lqA49JmMq0mcKbl12S2H1Y0Mej2sCs:hpnOPo5Rr+cpeJ4Jq0mcKp0S2GajZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-20_6a50a7a5dcd3375047cbbaa88d4c7c9a_mafia
Files
-
2024-04-20_6a50a7a5dcd3375047cbbaa88d4c7c9a_mafia.exe windows:5 windows x86 arch:x86
95aca322b1d428c2f628fd431dc5dc52
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetKeyState
SendMessageCallbackW
GetMessageW
SetTimer
RegisterWindowMessageW
DestroyIcon
LoadIconW
MsgWaitForMultipleObjectsEx
WaitForInputIdle
GetAsyncKeyState
OpenWindowStationW
CloseWindowStation
GetProcessWindowStation
SetProcessWindowStation
GetThreadDesktop
SetThreadDesktop
OpenDesktopW
CloseDesktop
ExitWindowsEx
AllowSetForegroundWindow
PeekMessageW
MsgWaitForMultipleObjects
GetSystemMetrics
SystemParametersInfoW
wsprintfW
shlwapi
PathIsFileSpecW
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
psapi
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
kernel32
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTickCount
CreateFileW
Sleep
SetFilePointer
WriteFile
CloseHandle
OutputDebugStringW
GetCurrentThreadId
QueryPerformanceCounter
OpenProcess
GetFileAttributesExW
GetCommandLineW
GetTempFileNameW
GetLongPathNameW
SearchPathW
FormatMessageW
LocalFree
CreateMutexW
WaitForSingleObject
CreateFileMappingW
MapViewOfFile
ReleaseMutex
UnmapViewOfFile
SetLastError
LoadLibraryW
GetProcAddress
FreeLibrary
QueryPerformanceFrequency
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
HeapFree
GetSystemTimeAsFileTime
GetTimeFormatW
GetDateFormatW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
GetModuleHandleW
ExitProcess
IsProcessorFeaturePresent
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapCreate
GetTimeZoneInformation
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
WriteConsoleW
SetStdHandle
CompareStringW
SetEnvironmentVariableA
GetCurrentProcessId
InitializeCriticalSection
ExpandEnvironmentStringsW
GetModuleFileNameW
GetLastError
FindResourceW
GlobalFree
GlobalUnlock
GlobalLock
ProcessIdToSessionId
GlobalAlloc
LocalAlloc
GetUserDefaultLangID
SetCurrentDirectoryW
GetCurrentDirectoryW
GetComputerNameExW
DeleteFileW
FindClose
ExitThread
SetFileAttributesW
CopyFileW
MoveFileExW
FindNextFileW
FindFirstFileW
GetSystemDefaultUILanguage
GetSystemDefaultLCID
FlushViewOfFile
OpenFileMappingW
GetSystemDirectoryW
DeviceIoControl
GetFileTime
SizeofResource
LockResource
LoadResource
GetVersionExW
CreateProcessW
GetTempPathW
GetDiskFreeSpaceExW
CreateThread
GetExitCodeThread
GetExitCodeProcess
TerminateThread
CreateEventW
OpenEventW
ResetEvent
SetEvent
GetLocalTime
GetSystemTime
GetFileAttributesW
OpenMutexW
CreateDirectoryW
GetShortPathNameW
GetFileSizeEx
PeekNamedPipe
GetEnvironmentVariableW
TryEnterCriticalSection
WaitForMultipleObjects
CreatePipe
GlobalMemoryStatusEx
FindResourceExW
advapi32
RegCloseKey
CheckTokenMembership
OpenProcessToken
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
GetUserNameW
RegOpenKeyExW
RegEnumKeyExW
shell32
SHGetSpecialFolderPathW
ExtractIconW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CLSIDFromString
oleaut32
SysFreeString
SysAllocString
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
secur32
GetUserNameExW
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ