D:\Programiranje\Bravo Studio\SVN\_WL_projects\_mightymagoo\trunk\bin\MightymagooSetup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
49a5529b28e44dccfb2bf57e50173adc4da7381a71b963cd520c6f179797f60b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
49a5529b28e44dccfb2bf57e50173adc4da7381a71b963cd520c6f179797f60b.exe
Resource
win10v2004-20240508-en
General
-
Target
49a5529b28e44dccfb2bf57e50173adc4da7381a71b963cd520c6f179797f60b
-
Size
1.7MB
-
MD5
5e361c8447547156de4e5957b2794cb2
-
SHA1
10528351d7a9d382837e317acb612d82579f51f6
-
SHA256
49a5529b28e44dccfb2bf57e50173adc4da7381a71b963cd520c6f179797f60b
-
SHA512
9118999fb0ba422268e52d8533e87fe40ce6f7898a60bfc59b155d493cc6e19d64bf34f2a37e72647edd7ccc68725ed62db12e2d5042358cf5287dc4c12ead1a
-
SSDEEP
49152:rHvy/rkO5SjEEKZWmODBpX6OXyb0lLDTGL:rHKo8emUBvWm7GL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49a5529b28e44dccfb2bf57e50173adc4da7381a71b963cd520c6f179797f60b
Files
-
49a5529b28e44dccfb2bf57e50173adc4da7381a71b963cd520c6f179797f60b.exe windows:5 windows x86 arch:x86
da27fc89bd0674130d543f235ae7b07e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrStrA
StrNCatA
StrChrA
wnsprintfA
StrToIntA
StrStrIA
PathFileExistsA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
MultiByteToWideChar
Process32Next
GetModuleHandleA
CreateToolhelp32Snapshot
MapViewOfFile
InterlockedDecrement
WideCharToMultiByte
CreateFileMappingA
OpenFileMappingA
OpenMutexA
GetComputerNameA
FindResourceA
FreeResource
LoadResource
GlobalLock
GlobalAlloc
SizeofResource
MulDiv
GlobalUnlock
GlobalFree
LockResource
GetFullPathNameA
DosDateTimeToFileTime
SetFileTime
GetFileTime
LocalFileTimeToFileTime
GetLocaleInfoA
RtlUnwind
FlushFileBuffers
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
Process32First
GetConsoleOutputCP
WriteConsoleA
SetEndOfFile
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
GetStringTypeW
GetStringTypeA
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapCreate
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
HeapSize
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetCommandLineA
GetConsoleMode
GetConsoleCP
GetFileType
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
MoveFileExA
FindNextFileA
FindClose
IsDebuggerPresent
FindFirstFileA
GetFileAttributesA
GetTempPathA
lstrcmpiA
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
GetVolumeInformationW
GetVersionExA
GetLocalTime
CreateThread
Sleep
LocalFree
LocalAlloc
GetVolumeInformationA
SetFilePointer
CreateMutexA
GetModuleFileNameA
GetLastError
CreateDirectoryA
ReadFile
CreateProcessA
GetTickCount
SleepEx
WaitForSingleObject
GetFileSize
ExitProcess
WritePrivateProfileStringA
DeleteFileA
LoadLibraryA
GetPrivateProfileStringA
GetProcAddress
lstrcatA
GetWindowsDirectoryA
GetCurrentProcess
FreeLibrary
lstrcpynA
lstrlenA
CloseHandle
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
CreateFileA
lstrcpyA
lstrcmpA
InitializeCriticalSection
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
WriteConsoleW
HeapReAlloc
GetSystemTimeAsFileTime
user32
SetCursor
UnregisterClassA
ExitWindowsEx
DrawFocusRect
GetWindowDC
DrawTextA
DrawEdge
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
FillRect
GetDlgItem
SetWindowTextA
GetDlgCtrlID
MoveWindow
EndPaint
GetKeyState
GetFocus
GetParent
IsWindowEnabled
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
InvalidateRect
ReleaseDC
PostMessageA
UpdateWindow
DestroyWindow
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SetFocus
SendMessageA
IsDialogMessageA
TranslateMessage
GetWindowLongA
CreateWindowExA
PeekMessageA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
MessageBoxA
FindWindowA
gdi32
LPtoDP
GetDeviceCaps
DPtoLP
SetMapMode
GetMapMode
CreateDIBitmap
CreateCompatibleBitmap
SetBkColor
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
GetStockObject
TextOutA
advapi32
OpenSCManagerA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
AdjustTokenPrivileges
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueA
SetNamedSecurityInfoA
RegDeleteValueA
RegOpenKeyA
CheckTokenMembership
RegOpenKeyExA
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
OpenProcessToken
shell32
SHGetFolderPathA
ShellExecuteA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
VariantClear
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ