C:\DevelopAgent\outputLSP\release\Agent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_a760b6681e12c770a1537f245252fc89_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_a760b6681e12c770a1537f245252fc89_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-04-27_a760b6681e12c770a1537f245252fc89_mafia
-
Size
305KB
-
MD5
a760b6681e12c770a1537f245252fc89
-
SHA1
93eb4c3eb6bf0eb17911fe3e49800372dd7a9359
-
SHA256
32ddc0a8bf7e1a6af8969e74428852f89ea33404db110207e6fe524b7dad2f2e
-
SHA512
ce7dcbbc54a5b37201b30dfca6dc339fcd4874ae04967f0dca4496f076b9ae16d1f8b778dae7b9aebfb15c7c634c3a84054b17fcfa566107d9cf4a29fac0437d
-
SSDEEP
6144:IYR3FpD9DEAC7z92bI3uRkSWVBsFHwqOrqYpVO7yqy9rwkHT3zYOc6XxmH:IY19DEHH9yvWVqpw/pVO7Yt5Hjj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-27_a760b6681e12c770a1537f245252fc89_mafia
Files
-
2024-04-27_a760b6681e12c770a1537f245252fc89_mafia.exe windows:5 windows x86 arch:x86
d29407c19f6c1c65eaa455ceab6e7b9b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLastError
CreateProcessW
GetVersionExW
OutputDebugStringW
WaitForSingleObject
CreateEventW
GetTickCount
GetExitCodeProcess
SetEvent
RaiseException
InitializeCriticalSectionAndSpinCount
lstrlenW
lstrcmpiW
FlushInstructionCache
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryExW
CreateMutexW
GetLongPathNameW
lstrlenA
WriteConsoleW
SetEnvironmentVariableA
CompareStringW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
HeapCreate
GetFileType
SetHandleCount
GetConsoleMode
HeapAlloc
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetTimeZoneInformation
CreateThread
ExitThread
GetLocalTime
GetDateFormatW
GetTimeFormatW
Sleep
HeapFree
GetCurrentProcessId
OpenProcess
TerminateProcess
GetCurrentProcess
IsWow64Process
GetModuleHandleW
SetFilePointer
SetEndOfFile
FlushFileBuffers
GetLastError
GetSystemTimeAsFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
FormatMessageW
LocalFree
WriteFile
CreateFileA
CreateFileW
ReadFile
CloseHandle
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
EnterCriticalSection
GetCurrentThreadId
RtlUnwind
DecodePointer
EncodePointer
InterlockedExchange
GetStringTypeW
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
GetProcessHeap
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetConsoleCP
user32
DefWindowProcW
SetWindowLongW
GetSysColor
MoveWindow
SetWindowPos
RegisterWindowMessageW
CharNextW
GetWindowLongW
GetClientRect
ClientToScreen
ScreenToClient
GetDC
GetClassNameW
GetWindow
ReleaseDC
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
IsChild
GetParent
GetDlgItem
ReleaseCapture
FillRect
DestroyWindow
CallWindowProcW
EndPaint
BeginPaint
GetDesktopWindow
DestroyAcceleratorTable
SetFocus
UnregisterClassA
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
CreateAcceleratorTableW
CreateWindowExW
RegisterClassExW
LoadCursorW
GetClassInfoExW
IsWindow
SendMessageW
GetFocus
gdi32
BitBlt
GetStockObject
GetObjectW
CreateSolidBrush
GetDeviceCaps
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
advapi32
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
QueryServiceStatus
CloseServiceHandle
RegQueryInfoKeyW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetKernelObjectSecurity
OpenSCManagerW
OpenServiceW
RegCloseKey
shell32
SHGetFolderPathW
ole32
OleUninitialize
OleInitialize
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
VarUI4FromStr
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysFreeString
VariantInit
VariantClear
SysAllocString
SysStringLen
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wininet
InternetCloseHandle
InternetConnectW
InternetSetOptionW
InternetOpenW
HttpOpenRequestW
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
iphlpapi
GetAdaptersInfo
gdiplus
GdiplusStartup
agentutil32
LoadIEConnectWindow
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ