C:\oobe\3.2\c3p0\dev\target\win\Release\AAMUpdatesNotifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_0bbd88eb10412bfcf4829f73e8258404_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-26_0bbd88eb10412bfcf4829f73e8258404_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-26_0bbd88eb10412bfcf4829f73e8258404_mafia
-
Size
1.8MB
-
MD5
0bbd88eb10412bfcf4829f73e8258404
-
SHA1
d3633ddcd0ced197dd107e035709d2aa198c3661
-
SHA256
0f90c61c71211be94dbdccfdd9f88bba793729527316d50a040d946d5c46a1b3
-
SHA512
38386dffa00fdbe31bc4a1801f9c8a5e5614b1ab4fa88514b29b304161313bf2a08bcaa20435db92600ec3cfdc32bb039b5e633a6e90c5bcd1d6217527d0cd37
-
SSDEEP
24576:o0XDErSe89c/FZbevPPO15qaMbNW2isv/G:o0zErKCdZqW3ORW2iS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-26_0bbd88eb10412bfcf4829f73e8258404_mafia
Files
-
2024-05-26_0bbd88eb10412bfcf4829f73e8258404_mafia.exe windows:5 windows x86 arch:x86
74ff3bd00cddc52e103da8d116c7aafd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DefWindowProcW
DestroyMenu
UpdateWindow
SendMessageW
MessageBoxW
InsertMenuW
CreateWindowExW
CreatePopupMenu
wsprintfW
EndPaint
DestroyWindow
TranslateAcceleratorW
GetMessageW
PostQuitMessage
TrackPopupMenu
PostMessageW
SetForegroundWindow
LoadCursorW
BeginPaint
TranslateMessage
LoadAcceleratorsW
RegisterClassExW
LoadIconW
GetCursorPos
DispatchMessageW
ole32
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
OleRun
CoInitialize
oleaut32
GetErrorInfo
SysFreeString
SysAllocString
shlwapi
PathFileExistsW
PathRemoveFileSpecW
kernel32
GetTickCount
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InterlockedDecrement
QueryPerformanceCounter
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetStdHandle
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
HeapCreate
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
GetConsoleMode
GetConsoleCP
HeapSize
IsProcessorFeaturePresent
WaitForSingleObject
GetLastError
GetCurrentThreadId
CloseHandle
SetEvent
CreateEventW
WaitForMultipleObjects
CreateThread
GetDateFormatW
Sleep
GetTimeFormatW
GetLocalTime
GetSystemDefaultLangID
CreateProcessW
WriteFile
WideCharToMultiByte
ReadFile
GetModuleFileNameW
CreateFileW
MultiByteToWideChar
FlushFileBuffers
GetTempPathW
SetLastError
LocalAlloc
GetUserDefaultUILanguage
LocalFree
lstrlenA
InterlockedIncrement
ExitProcess
ReleaseSemaphore
CreateSemaphoreW
OpenSemaphoreW
GetCurrentProcessId
SetFilePointer
CreateDirectoryW
FreeLibrary
LoadLibraryW
GetProcAddress
IsDBCSLeadByteEx
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
GetModuleHandleW
IsDebuggerPresent
advapi32
SetSecurityDescriptorDacl
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
FreeSid
shell32
Shell_NotifyIconW
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.5MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE