C:\BuildAgent\work\52fbca0759d0cd8c\iclsClient\Release\HeciServer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_e976acc062b475f5b4ae471aef0cd674_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-25_e976acc062b475f5b4ae471aef0cd674_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-25_e976acc062b475f5b4ae471aef0cd674_mafia
-
Size
609KB
-
MD5
e976acc062b475f5b4ae471aef0cd674
-
SHA1
7e3360a4acdbf8ef78afa33c99f5a72cc710cb6a
-
SHA256
fe947a504321bc8dadeefbd64b800d48ef9e1e935f78edd67fda6310b954c6f8
-
SHA512
569d532c653421129e383a33c3184954fd03e211a721f98ef0b958c58279ce4f37ea7f86d2fe1d91cc40d96694a5cb1fba6251295a1418c313aa6d02f40318b5
-
SSDEEP
12288:MPXUatYLLZlrKoyu8w0v2pZzBjuSA9sHsS+3kJsw4HXt1:MPXntsKruq2bNuSh+UJsw43t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-25_e976acc062b475f5b4ae471aef0cd674_mafia
Files
-
2024-05-25_e976acc062b475f5b4ae471aef0cd674_mafia.exe windows:5 windows x86 arch:x86
5e52fc9e802f3b93a94802194281c698
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
shlwapi
PathStripPathW
PathAppendW
kernel32
LoadResource
FindResourceW
LoadLibraryExW
LocalFree
GetCurrentProcess
GetCommandLineW
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
FormatMessageW
TerminateProcess
CreateDirectoryW
GetFileAttributesW
GetCurrentProcessId
CreateMutexW
OpenMutexW
OutputDebugStringW
GetUserDefaultLangID
WriteFile
ReadFile
SizeofResource
GetOverlappedResult
DeviceIoControl
CancelIo
GetFileInformationByHandle
GetFullPathNameA
FlushFileBuffers
SetFilePointer
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
MultiByteToWideChar
FreeLibrary
SetEvent
InterlockedDecrement
CreateEventW
CreateThread
GetCurrentThreadId
Sleep
GetModuleFileNameW
WaitForSingleObject
ReleaseMutex
CloseHandle
lstrcmpiW
GetModuleHandleW
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
lstrlenW
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
SetEndOfFile
GetProcessHeap
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetTimeZoneInformation
LoadLibraryW
GetDriveTypeW
HeapReAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetEnvironmentVariableA
CreateFileW
GetLocalTime
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapCreate
GetStdHandle
ExitProcess
IsProcessorFeaturePresent
CompareStringW
GetDateFormatA
GetTimeFormatA
GetCPInfo
LCMapStringW
GetConsoleMode
GetConsoleCP
GetFileType
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
DeleteFileA
MoveFileA
WideCharToMultiByte
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
EncodePointer
DecodePointer
GetLocaleInfoW
HeapAlloc
HeapFree
RtlUnwind
HeapSetInformation
GetStartupInfoW
user32
CharUpperW
DispatchMessageW
MessageBoxW
PostThreadMessageW
GetMessageW
CharNextW
TranslateMessage
LoadStringW
advapi32
SetKernelObjectSecurity
RegCreateKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
SetEntriesInAclW
AllocateAndInitializeSid
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyW
GetSecurityDescriptorLength
ControlService
DeleteService
CreateServiceW
RegEnumKeyExW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
SetServiceStatus
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
shell32
SHGetFolderPathW
ole32
CoInitializeSecurity
CoReleaseServerProcess
CoAddRefServerProcess
CoCreateInstance
StringFromGUID2
CoUninitialize
CoInitialize
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VariantClear
SafeArrayGetVartype
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
SafeArrayCreateVector
SafeArrayPutElement
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
Sections
.text Size: 414KB - Virtual size: 414KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 91KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
qshiatf Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE