C:\DevelopAgent\outputLSP\release\Agent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_f9a41ab99a17d59b7b55fbb7b8668e84_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-26_f9a41ab99a17d59b7b55fbb7b8668e84_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-26_f9a41ab99a17d59b7b55fbb7b8668e84_mafia
-
Size
305KB
-
MD5
f9a41ab99a17d59b7b55fbb7b8668e84
-
SHA1
cd41364cefef67fc42df71bad70d896da3597d0e
-
SHA256
ca7129990f2a8ad802816f0524e39a6715e1b740c375121467a071058fcaf829
-
SHA512
b7d193edf985ea8397ea581691bb4b296902680bc43b0141802c12fa041eae298bd1bd97895b5c836fb48cccd3bd26d1e0e1840be7d73c9822e01b0b2368997c
-
SSDEEP
6144:WNsos96wurxlU5vCqFYKkMV3h2oauukRmpS9T13WKOqX7xmL:WNG96wurxlU5abMVxXaFkRmYl13d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-26_f9a41ab99a17d59b7b55fbb7b8668e84_mafia
Files
-
2024-04-26_f9a41ab99a17d59b7b55fbb7b8668e84_mafia.exe windows:5 windows x86 arch:x86
f109f49b1009c0cfe688dba66759aee0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
GetVersionExW
OutputDebugStringW
WaitForSingleObject
CreateEventW
GetTickCount
GetExitCodeProcess
SetEvent
RaiseException
InitializeCriticalSectionAndSpinCount
lstrlenW
lstrcmpiW
FlushInstructionCache
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryExW
CreateMutexW
GetLongPathNameW
lstrlenA
GetCommandLineW
WriteConsoleW
SetEnvironmentVariableA
CompareStringW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
HeapCreate
GetFileType
SetHandleCount
GetConsoleMode
GetProcessHeap
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetTimeZoneInformation
ExitProcess
SetLastError
CreateThread
ExitThread
GetLocalTime
GetDateFormatW
GetTimeFormatW
Sleep
HeapAlloc
HeapFree
GetCurrentProcessId
OpenProcess
TerminateProcess
GetCurrentProcess
IsWow64Process
GetModuleHandleW
SetFilePointer
SetEndOfFile
FlushFileBuffers
GetLastError
GetSystemTimeAsFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
FormatMessageW
LocalFree
WriteFile
CreateFileA
CreateFileW
ReadFile
CloseHandle
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
EnterCriticalSection
GetCurrentThreadId
RtlUnwind
DecodePointer
EncodePointer
InterlockedExchange
GetStringTypeW
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetConsoleCP
user32
GetWindowLongW
DefWindowProcW
CharNextW
SetWindowLongW
MoveWindow
SetWindowPos
GetClientRect
RegisterWindowMessageW
GetSysColor
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
GetClassNameW
GetWindow
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
IsChild
GetParent
GetDlgItem
ReleaseCapture
FillRect
DestroyWindow
CallWindowProcW
EndPaint
BeginPaint
GetDesktopWindow
DestroyAcceleratorTable
SetFocus
UnregisterClassA
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
CreateAcceleratorTableW
CreateWindowExW
RegisterClassExW
LoadCursorW
GetClassInfoExW
IsWindow
SendMessageW
GetFocus
gdi32
BitBlt
GetStockObject
GetObjectW
CreateSolidBrush
GetDeviceCaps
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
advapi32
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
QueryServiceStatus
CloseServiceHandle
RegQueryInfoKeyW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetKernelObjectSecurity
OpenSCManagerW
OpenServiceW
RegCloseKey
shell32
SHGetFolderPathW
ole32
OleInitialize
OleUninitialize
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysAllocStringLen
VarUI4FromStr
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysFreeString
VariantInit
VariantClear
SysAllocString
SysStringLen
SysAllocStringByteLen
SysStringByteLen
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wininet
HttpOpenRequestW
InternetCloseHandle
InternetConnectW
InternetSetOptionW
InternetOpenW
HttpSendRequestW
InternetReadFile
HttpQueryInfoW
InternetQueryDataAvailable
iphlpapi
GetAdaptersInfo
gdiplus
GdiplusStartup
agentutil32
LoadIEConnectWindow
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ