Static task
static1
Behavioral task
behavioral1
Sample
20240517a87d854257425fabf9199f226ded233emafia.exe
Resource
win7-20240221-en
General
-
Target
20240517a87d854257425fabf9199f226ded233emafia.bin
-
Size
2.3MB
-
MD5
a87d854257425fabf9199f226ded233e
-
SHA1
2754acd447aaec96efe28a06cde353b05b6c67be
-
SHA256
bd4cac653a588a05eaf70b96e05022e2469795eaa3619bcd3fb9cbbc4e28ad31
-
SHA512
f68a74f1dd19ee1f4debd69e88bb36758ef31f36f5cbb71e4294081e15d3836678844798cd3794b1a0ae7206d4e6a8ddc75a07fceeded2e21921046f628084e9
-
SSDEEP
49152:rpE6gw14kZV2HXsMnmjEREseBSsxHnfXsrHYi2YijiKLNiXicJFFRGNzj3:1wYJY47wRGpj3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20240517a87d854257425fabf9199f226ded233emafia.bin
Files
-
20240517a87d854257425fabf9199f226ded233emafia.bin.exe windows:5 windows x86 arch:x86
136bea86936e01e1f983ef31dafa8b2a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SizeofResource
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetShortPathNameW
SetLastError
GetFileAttributesW
SetFileAttributesW
LoadResource
LocalFree
GetProcessHeap
SetEndOfFile
CreateProcessA
GetExitCodeProcess
FindResourceW
GetEnvironmentVariableW
CreateDirectoryW
Sleep
Process32NextW
TerminateProcess
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
WaitForSingleObject
CreateProcessW
GetTickCount
lstrlenW
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
CloseHandle
DeviceIoControl
CreateFileW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentProcessId
GetNativeSystemInfo
GetCurrentProcess
GetVersionExW
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileAttributesA
SetStdHandle
LoadLibraryW
SetEnvironmentVariableA
GetTimeZoneInformation
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLocaleInfoW
HeapFree
GetCPInfo
HeapAlloc
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
ExitProcess
DeleteFileW
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
LCMapStringW
CompareStringW
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetACP
GetOEMCP
IsValidCodePage
ReadFile
WriteFile
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
SetFilePointer
user32
MessageBoxW
GetSystemMetrics
advapi32
AllocateAndInitializeSid
SetNamedSecurityInfoW
SetEntriesInAclW
GetNamedSecurityInfoW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ControlService
QueryServiceStatus
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
FreeSid
shell32
SHGetFolderPathW
psapi
GetModuleFileNameExW
EnumProcessModules
shlwapi
StrStrIW
wintrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
CryptCATAdminReleaseContext
CryptCATAdminCalcHashFromFileHandle
WinVerifyTrust
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
Sections
.text Size: 438KB - Virtual size: 437KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE