E:\4.0\百宝云更新系统\MySolution\BbyUpdater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_10a3c679b61e7f46c3c1e4ef95264473_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-07_10a3c679b61e7f46c3c1e4ef95264473_mafia.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-07_10a3c679b61e7f46c3c1e4ef95264473_mafia
-
Size
1.2MB
-
MD5
10a3c679b61e7f46c3c1e4ef95264473
-
SHA1
8360e2ce863d8a0eccb4716b638f499de4dbb07f
-
SHA256
1e575e09295d4f6f4ff92001b58d0f7b931679b141491778f4b08453cc3bb24e
-
SHA512
277fca49e6f2b76521dd4438c1fe35ebb2f89081b7946425fbac0998586eb4e08adceeddd376d227be68f3a2b8dcf83d224006783d31fc6818ff34f25a7cf6a4
-
SSDEEP
12288:NhImff2DEaLaIkQcITZLNfvmnQbQYPNrFSB5zqQM1XrLLw3HnI81hImff2DEaLar:2LaINcqZpvmKAOLaINcqZpvmKA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-07_10a3c679b61e7f46c3c1e4ef95264473_mafia
Files
-
2024-05-07_10a3c679b61e7f46c3c1e4ef95264473_mafia.exe windows:5 windows x86 arch:x86
5f23347b974812feb3356b31a945d19d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateProcess
GetModuleFileNameW
CreateFileW
GetLastError
GetCurrentDirectoryW
GetProcAddress
MoveFileW
FindClose
Process32FirstW
GetExitCodeThread
SetCurrentDirectoryW
Process32NextW
lstrcatW
CreateToolhelp32Snapshot
CloseHandle
DeleteFileW
GetCurrentProcessId
lstrcpyW
CreateThread
HeapAlloc
HeapFree
GetProcessHeap
TerminateThread
OpenProcess
WriteFile
GetTickCount
GetModuleHandleW
OutputDebugStringW
SetEndOfFile
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
LCMapStringW
WriteConsoleW
SetStdHandle
LoadLibraryW
InterlockedExchange
WaitForSingleObject
GetCurrentProcess
FindFirstFileW
GetStringTypeW
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
ReadFile
HeapSize
GetSystemTimeAsFileTime
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
HeapCreate
ExitProcess
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
Sleep
MultiByteToWideChar
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
QueryPerformanceCounter
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
EncodePointer
DecodePointer
ExitThread
GetCurrentThreadId
user32
SetDlgItemTextW
GetSystemMetrics
MessageBoxW
GetDlgItem
SendMessageW
CreateDialogParamW
TranslateMessage
GetDesktopWindow
SetWindowPos
UpdateWindow
SetWindowTextW
GetWindowTextW
ShowWindow
DispatchMessageW
wsprintfW
DestroyWindow
SetTimer
GetWindowRect
GetMessageW
PostQuitMessage
KillTimer
gdi32
SetBkMode
GetStockObject
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CryptReleaseContext
CryptAcquireContextW
CryptGenRandom
shell32
CommandLineToArgvW
SHChangeNotify
ShellExecuteW
shlwapi
PathStripPathW
PathAppendW
psapi
GetModuleFileNameExW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ws2_32
WSACleanup
WSAStartup
gethostbyname
closesocket
socket
setsockopt
htons
htonl
send
recv
inet_addr
connect
wininet
InternetOpenUrlA
InternetReadFile
InternetOpenA
InternetCloseHandle
Sections
.text Size: 303KB - Virtual size: 303KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 91KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ