ptConfig
ptLang
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_0881c497d9951172c4e97f9e57ae6baf_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-12_0881c497d9951172c4e97f9e57ae6baf_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-05-12_0881c497d9951172c4e97f9e57ae6baf_mafia
Size
243KB
MD5
0881c497d9951172c4e97f9e57ae6baf
SHA1
0127a8b7ae74a92dc781d82c33c4ed2a6d84a885
SHA256
6b25ea19296fdd3876566dfa4a8f07c7b5e92f1731cff2a6b54e7f8e37557c6c
SHA512
ef12421cb36529d1b4dd17a4679f594d18f20ae06405ce62144a19638429674e0f781282f1c42fe8a6508e860bbefbfc17db72f800689ec153ddb158677b1d63
SSDEEP
3072:E0eobR5mwy0XyYXgCBlFg6ZV1tvebuYF6xvWhaI4HWSxF9te:TF5mAXVXgCBlFg6ZV1tmyKX4HW0k
Checks for missing Authenticode signature.
resource |
---|
2024-05-12_0881c497d9951172c4e97f9e57ae6baf_mafia |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenProcess
SetCurrentDirectoryA
GetLastError
GetModuleFileNameA
CreateMutexA
CloseHandle
SetEndOfFile
CreateFileA
InitializeCriticalSection
CreateFileW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
WriteConsoleW
SetStdHandle
LoadLibraryW
InterlockedExchange
GetCommandLineA
HeapReAlloc
GetStringTypeW
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
RaiseException
GetLocaleInfoW
GetModuleFileNameW
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
GetCurrentProcess
SetPriorityClass
ExitProcess
Sleep
HeapCreate
IsProcessorFeaturePresent
HeapAlloc
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
GetProcAddress
GetCurrentThreadId
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
LeaveCriticalSection
GetProcessHeap
EnterCriticalSection
HeapFree
RegisterHotKey
LoadCursorA
DestroyWindow
GetMessageA
SetTimer
RegisterClassExA
PostQuitMessage
TrackPopupMenu
KillTimer
SetForegroundWindow
LoadStringA
LoadIconA
RegisterWindowMessageA
GetDC
TranslateMessage
GetForegroundWindow
SetWindowLongA
MessageBoxA
GetWindowLongA
CreateWindowExA
ReleaseDC
DefWindowProcA
GetDesktopWindow
SetWindowPos
GetCursorPos
ShowWindow
CreatePopupMenu
PostMessageA
DispatchMessageA
SystemParametersInfoA
GetSystemMetrics
AllowSetForegroundWindow
InsertMenuA
UnregisterHotKey
CreateSolidBrush
GetDeviceCaps
Shell_NotifyIconA
loadHookConfig
setLastActive
getGesturesDisabled
clearMyHook
openSettings
setLearningMode
getHookBtn
setPreviousTrainingModeState
getDrawGesture
reloadLuaState
getTrayIconVisible
openHotkeys
setWindowState
openHelp
openConfig
setTrayID
openIgnored
getCheckForOtherGesturePrograms
getReInitOnResume
clearCaptureVars
FireHotkey
setTrayIconVisible
LoadHotkeys
openPrefs
openGestureName
getHideAdditionalInstanceMessage
getCheckForegroundTimeout
setDrawGesture
openPassword
setDPIModifier
getLearningMode
openAbout
setGesturesDisabled
saveConfig
setOSVersion
setWindowTransparency
setMyHook
setHookBtn
sethWndServer
EnumProcesses
GetModuleBaseNameA
EnumProcessModules
GdiplusStartup
GdiplusShutdown
ptConfig
ptLang
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ