C:\Users\apang1992\Desktop\self\self\Debug\self.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_3a2bcfe90955dca61a361a43502e630c_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-24_3a2bcfe90955dca61a361a43502e630c_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-24_3a2bcfe90955dca61a361a43502e630c_mafia
-
Size
3.9MB
-
MD5
3a2bcfe90955dca61a361a43502e630c
-
SHA1
91e4cf6721b9b1226e0ea1e90b1f6108d3693d90
-
SHA256
c06848a75a7d55fd201a9b5c8b149e310e415af5436d7ba6eba8fc6841a20a96
-
SHA512
a01240ec27cfca4fc038e04b94d4681118e5246aaab2229b7ef3e02294ef8370ded22889f90561ca8ae143eb107782fa46cf064043b8ca44c3f571872fe5bc4a
-
SSDEEP
98304:wCEYc83WQpytmvzOhfpZC7ocr5a87XC8O/tqWbxMuw4:yYcQpytMop87jO/tquxRw4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_3a2bcfe90955dca61a361a43502e630c_mafia -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_2
Files
-
2024-05-24_3a2bcfe90955dca61a361a43502e630c_mafia.exe windows:5 windows x86 arch:x86
bde77046cfb8af7aa15e6feb442ba4f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WinExec
IsValidLocale
EnumSystemLocalesA
GetLastError
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetFileAttributesA
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
HeapAlloc
GetCommandLineA
HeapSetInformation
HeapCreate
HeapDestroy
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
Sleep
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
CloseHandle
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
MultiByteToWideChar
ReadFile
SetFilePointer
RtlUnwind
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
GetModuleFileNameW
IsProcessorFeaturePresent
RaiseException
lstrlenA
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
SetStdHandle
WriteConsoleW
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
CreateFileA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetProcessHeap
VirtualQuery
CreateFileW
GetStringTypeW
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
CreateDirectoryA
user32
MessageBoxW
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ