D:\qb_installer\workspace\ubit\Installers\GFX_Installer\PrInstaller\ASE_Installers\HDMI\Release\GFX.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_f4f3b3596b9c8e8f103acdce630e7dff_mafia.exe
Resource
win7-20231129-en
General
-
Target
2024-05-07_f4f3b3596b9c8e8f103acdce630e7dff_mafia
-
Size
1.5MB
-
MD5
f4f3b3596b9c8e8f103acdce630e7dff
-
SHA1
953c67e009c1394669178ca98630981b7e1ca70d
-
SHA256
ba88337ca5d19be5719624824d71987e02f05ddefc333f980840448dda6df2cd
-
SHA512
8a162da6583efc5272ed838e1152ace35d1ea9e11cf6950d8029de212bd0a6378a5d4727824269714381d8c7b61f28cfd3972ad870266efc163fb5d9803fe696
-
SSDEEP
24576:JSNzapKp235b2iDL9A99J/ky/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:JEOpIY5bJDLejJ1LNiXicJFFRGNzj3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-07_f4f3b3596b9c8e8f103acdce630e7dff_mafia
Files
-
2024-05-07_f4f3b3596b9c8e8f103acdce630e7dff_mafia.exe windows:5 windows x86 arch:x86
d84915d3ba80fc92115335c3d6a2c07c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MoveFileW
RemoveDirectoryW
GetCurrentDirectoryW
CreateFileW
GetFileSize
ReadFile
MultiByteToWideChar
GetFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
LoadLibraryW
CreateMutexW
CreateThread
GetPrivateProfileStringW
GetLocalTime
GetCommandLineW
GetTickCount
SetFilePointer
WriteFile
EnumResourceLanguagesW
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersion
ConvertDefaultLocale
GetLocaleInfoW
GetVersionExW
GetCurrentProcess
GetSystemInfo
GetSystemWow64DirectoryW
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
GetExitCodeProcess
CreateEventW
SetEvent
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CompareFileTime
LocalAlloc
GetProcessHeap
SetEndOfFile
SetErrorMode
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsProcessorFeaturePresent
WriteConsoleW
SetStdHandle
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetCurrentThreadId
GetFileType
HeapCreate
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
RaiseException
GetStartupInfoW
CopyFileW
GetTempFileNameW
GetTempPathW
GetEnvironmentVariableW
GetSystemDirectoryW
GetFileAttributesW
FreeLibrary
GetProcAddress
ExitProcess
LoadLibraryExW
Sleep
SetFileAttributesW
MoveFileExW
DeleteFileW
WaitForSingleObject
CreateProcessW
SetLastError
VerifyVersionInfoW
VerSetConditionMask
GetWindowsDirectoryW
FindNextFileW
FindClose
TlsAlloc
FindFirstFileW
LocalFree
GetModuleFileNameW
GetLastError
SizeofResource
LockResource
LoadResource
FindResourceW
GetModuleHandleW
TlsSetValue
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
TlsGetValue
HeapSetInformation
GetCPInfo
GetConsoleMode
GetConsoleCP
HeapFree
HeapAlloc
DecodePointer
EncodePointer
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
WideCharToMultiByte
CloseHandle
CreateFileA
TlsFree
HeapReAlloc
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
user32
SendMessageW
GetDlgItem
wsprintfW
ShowWindow
EndDialog
DialogBoxIndirectParamW
MonitorFromWindow
GetMonitorInfoW
OffsetRect
GetWindowLongW
AdjustWindowRect
GetWindowRect
DrawTextW
LoadIconW
SetRectEmpty
PostMessageW
EnableWindow
ReleaseDC
GetDC
SetFocus
SetWindowPos
GetClientRect
SetWindowTextW
MessageBoxIndirectW
LoadImageW
SendMessageTimeoutW
ExitWindowsEx
EnumWindows
GetWindowThreadProcessId
GetWindowModuleFileNameW
LoadStringW
DialogBoxParamW
MessageBoxW
KillTimer
SendDlgItemMessageW
SetTimer
SetDlgItemTextW
gdi32
SetBkMode
SetTextColor
DeleteDC
GetTextExtentPoint32W
SelectObject
CreateCompatibleDC
DeleteObject
CreateFontW
GetStockObject
advapi32
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
RegEnumValueW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegCreateKeyExW
RegSetValueExW
IsTextUnicode
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
DeleteService
ControlService
QueryServiceConfigW
StartServiceW
CloseServiceHandle
ChangeServiceConfigW
ChangeServiceConfig2W
CreateServiceW
OpenServiceW
OpenSCManagerW
QueryServiceStatus
RegDeleteValueW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
shell32
SHCreateDirectoryExA
SHGetFolderPathW
SHCreateDirectoryExW
CommandLineToArgvW
ole32
CLSIDFromString
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
cabinet
ord22
ord23
ord20
ord21
setupapi
SetupDiSetClassInstallParamsW
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiGetINFClassW
SetupFindNextLine
SetupGetStringFieldW
SetupGetLineTextW
SetupOpenInfFileW
SetupCloseInfFile
SetupDiGetDeviceInstallParamsW
SetupFindFirstLineW
SetupDiCallClassInstaller
shlwapi
PathIsSystemFolderW
PathIsRootW
ord176
PathRenameExtensionW
PathRemoveBackslashW
PathRemoveFileSpecA
PathAddBackslashA
PathFindFileNameA
PathIsDirectoryEmptyW
SHStrDupW
PathCombineW
PathFindExtensionW
PathStripPathW
SHDeleteKeyW
PathFileExistsW
PathFindFileNameW
PathAppendA
PathRemoveFileSpecW
PathMatchSpecA
PathAppendW
PathStripToRootW
PathAddBackslashW
PathIsDirectoryW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
psapi
EnumProcessModules
GetModuleFileNameExW
Sections
.text Size: 328KB - Virtual size: 328KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 524KB - Virtual size: 523KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE