G:\project\work\20230810\Mist\Release\IFirstExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_70abb9ed5b6fd63ea8c79bdb87b30063_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_70abb9ed5b6fd63ea8c79bdb87b30063_mafia.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-27_70abb9ed5b6fd63ea8c79bdb87b30063_mafia
-
Size
179KB
-
MD5
70abb9ed5b6fd63ea8c79bdb87b30063
-
SHA1
60df1b1e3ddbec5bcf254467e13356a38064e500
-
SHA256
c98df4b7a2ee9f84c0ee898cc93f874d2a399d15087b50c7b427c5799602390e
-
SHA512
2563ecb337a5b05ed16797386c8087dc326267499ac585d672cf4fc359b8a629ed224a7f1d86d539b499ee88703dca91769b98381205d6f0139af888083ef8bd
-
SSDEEP
1536:dfQFlcjpEw8wf8zjoT6iLoZGkNdcyLfcBgjrdYn8Q+d1AnKteqEmbaLA67sz1Dd5:dm6lDrf8zjoWUoZGkWARAnJq41szTpZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-27_70abb9ed5b6fd63ea8c79bdb87b30063_mafia
Files
-
2024-04-27_70abb9ed5b6fd63ea8c79bdb87b30063_mafia.exe windows:5 windows x86 arch:x86
193086b1023fd798af73f2b2002b8ba8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
GetProcAddress
WaitForSingleObject
GetSystemDirectoryW
GetStartupInfoW
CreateProcessW
GetVersionExA
GetCurrentProcess
ProcessIdToSessionId
GetCurrentProcessId
CreateThread
Sleep
ExitProcess
SetErrorMode
LoadLibraryA
GetExitCodeThread
CreatePipe
FlushFileBuffers
PeekNamedPipe
TerminateProcess
DisconnectNamedPipe
ExpandEnvironmentStringsW
GetDriveTypeW
GetVolumeInformationW
GetDiskFreeSpaceExW
GetLogicalDrives
FindFirstFileW
FindNextFileW
FindClose
GetComputerNameW
GetSystemInfo
GlobalMemoryStatusEx
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
SetEvent
DeleteFileW
RemoveDirectoryW
InterlockedExchange
LoadLibraryW
EncodePointer
DecodePointer
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
HeapSetInformation
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
HeapFree
HeapSize
GetModuleHandleW
IsProcessorFeaturePresent
GetCPInfo
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
LCMapStringW
RtlUnwind
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
WriteConsoleW
SetStdHandle
WideCharToMultiByte
MultiByteToWideChar
WriteFile
ReadFile
SetFilePointer
GetFileAttributesW
CreateFileW
GetFileSize
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
GetLastError
WTSGetActiveConsoleSessionId
CloseHandle
user32
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
advapi32
DuplicateTokenEx
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameW
ImpersonateLoggedOnUser
RevertToSelf
CreateProcessAsUserW
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
GetUserNameA
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ