D:\Projects\Tracer-Sandbox1.4\FortiTracer\cui\Release\FortiTracer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-15_88b9160b433adde650b0f97b9c722e1a_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-15_88b9160b433adde650b0f97b9c722e1a_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-15_88b9160b433adde650b0f97b9c722e1a_mafia
-
Size
958KB
-
MD5
88b9160b433adde650b0f97b9c722e1a
-
SHA1
8777bebe45eea242f3b5190cd5a55fb86d1e8b61
-
SHA256
4dba8f3627868a24dd40de879990f7cea6e968d0f8804765aae114bb6a23f6e7
-
SHA512
554ca6e46bc8ac866c7faeec07004398c2d15c07f1c1455bdb212ea73c51560b9eaeeeb39b1ef844c3ee92b82ac90ed61981e0a91e8a2ab66ba728b7de72554a
-
SSDEEP
24576:fvzS7qB5ZtcUibbvREGc+3gpvTjZAEi8u8Lpw6n:fS0JoeywpvTjOEixopw6n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-15_88b9160b433adde650b0f97b9c722e1a_mafia
Files
-
2024-05-15_88b9160b433adde650b0f97b9c722e1a_mafia.exe windows:5 windows x86 arch:x86
0bef4f3a3d905719ed2236640634557f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadProcessMemory
VirtualFreeEx
OpenProcess
GetSystemTime
GetSystemInfo
GetProcAddress
FlushFileBuffers
CreateFileW
GetVersionExW
WriteFile
VirtualAllocEx
SystemTimeToTzSpecificLocalTime
DosDateTimeToFileTime
GetLogicalDrives
VirtualAlloc
VirtualFree
VirtualQuery
VirtualProtect
FlushInstructionCache
Thread32Next
Thread32First
InitializeCriticalSection
SetEnvironmentVariableA
CompareStringW
GetDriveTypeW
ResumeThread
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTimeZoneInformation
GetStringTypeW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsProcessorFeaturePresent
GetLocaleInfoW
WriteConsoleW
GetStartupInfoW
SetHandleCount
HeapDestroy
HeapCreate
UnhandledExceptionFilter
GetFullPathNameW
GetCPInfo
InterlockedDecrement
RtlUnwind
GetLocalTime
EncodePointer
SetCurrentDirectoryW
GetCurrentDirectoryW
CopyFileW
GetSystemDirectoryW
SetThreadContext
GetThreadContext
GetCurrentProcessId
DeviceIoControl
GetPrivateProfileIntW
SizeofResource
GetPrivateProfileStringW
GetModuleHandleW
FindResourceW
GetTickCount
FileTimeToSystemTime
WaitForMultipleObjects
CreateEventW
InterlockedExchange
InterlockedCompareExchange
SetConsoleCtrlHandler
ExpandEnvironmentStringsW
GetShortPathNameW
TerminateThread
GetStdHandle
SetConsoleTextAttribute
CancelIo
GetOverlappedResult
GetSystemTimeAsFileTime
WaitForSingleObject
GetLongPathNameW
WritePrivateProfileStringW
DecodePointer
ExitProcess
GetConsoleMode
GetConsoleCP
HeapReAlloc
SetStdHandle
CreateFileA
GetFileType
PeekNamedPipe
LoadLibraryExW
CloseHandle
CreateFileMappingW
GetLastError
FlushViewOfFile
UnmapViewOfFile
IsValidLocale
MapViewOfFile
FileTimeToLocalFileTime
InterlockedIncrement
GetFileInformationByHandle
TlsFree
TlsAlloc
TlsSetValue
TlsGetValue
FreeLibrary
LoadLibraryA
FindClose
FindNextFileA
FindFirstFileA
TerminateProcess
IsBadReadPtr
WriteProcessMemory
VirtualProtectEx
IsBadWritePtr
OpenThread
VirtualQueryEx
GetProcessTimes
CreateProcessW
ReadFile
SetFilePointer
SetLastError
LocalFree
LocalAlloc
GetFileSize
SetEndOfFile
LoadLibraryW
QueryDosDeviceW
GetTempPathW
GetWindowsDirectoryW
GetEnvironmentVariableW
GetCurrentProcess
SuspendThread
lstrlenW
FindFirstFileW
HeapFree
HeapAlloc
GetProcessHeap
FormatMessageW
LocalReAlloc
CreateSemaphoreW
SetEvent
CreateThread
ReleaseSemaphore
DuplicateHandle
DeleteFileW
MoveFileW
GetFileAttributesW
FindNextFileW
CreateDirectoryW
WideCharToMultiByte
MultiByteToWideChar
GetVolumeInformationW
CreateMutexW
FormatMessageA
GetModuleFileNameW
GetModuleHandleA
OutputDebugStringA
ReleaseMutex
GetCommandLineW
GetUserDefaultLangID
Process32FirstW
Process32NextW
HeapSetInformation
CreateToolhelp32Snapshot
GetCurrentThreadId
Sleep
RaiseException
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InterlockedExchangeAdd
SetUnhandledExceptionFilter
GetNativeSystemInfo
QueryPerformanceCounter
LocalFileTimeToFileTime
gdi32
DeleteDC
CreateDIBSection
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
SaveDC
RestoreDC
BitBlt
user32
GetDesktopWindow
GetWindowDC
CharUpperW
MessageBoxW
GetWindowRect
LoadStringW
wsprintfW
GetSystemMetrics
IsRectEmpty
GetLastActivePopup
IsWindowEnabled
FindWindowW
EnumWindows
IntersectRect
GetAncestor
FindWindowExW
IsWindowVisible
SendMessageW
GetWindowThreadProcessId
ws2_32
gethostname
WSAStartup
gethostbyname
getaddrinfo
freeaddrinfo
WSAGetLastError
WSAAddressToStringA
inet_addr
ntohl
htonl
WSACleanup
htons
ntohs
inet_ntoa
gdiplus
GdiplusShutdown
GdipFree
GdipAlloc
GdipGetImageEncodersSize
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdipSaveImageToFile
GdipCloneImage
GdiplusStartup
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenSCManagerW
CloseServiceHandle
CreateServiceW
StartServiceW
OpenProcessToken
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
DeleteService
ControlService
OpenServiceW
wintrust
CryptCATAdminAcquireContext
CryptCATAdminReleaseContext
CryptCATCatalogInfoFromContext
WinVerifyTrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminEnumCatalogFromHash
IsCatalogFile
CryptCATAdminCalcHashFromFileHandle
crypt32
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertFindCertificateInStore
CryptMsgGetParam
CertGetNameStringW
CryptQueryObject
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
CommandLineToArgvW
winmm
timeGetTime
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
psapi
GetModuleInformation
EnumProcessModules
GetModuleFileNameExW
Sections
.text Size: 719KB - Virtual size: 719KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ