D:\pyc\CMMI_项目\2014-013_PBB2\开发库\SRC\PbbForPC\pycFileViewer\Release\pycFileViewer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_79e3807e8c84d62b6040a3a1f394499a_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-26_79e3807e8c84d62b6040a3a1f394499a_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_79e3807e8c84d62b6040a3a1f394499a_mafia
-
Size
15.3MB
-
MD5
79e3807e8c84d62b6040a3a1f394499a
-
SHA1
af16a46f7a46842cd810f2bcbeeaf97482440fd7
-
SHA256
f02996e9d1e92a2913f5f9af3a1344ba6f51e42a44107651ab0bc4b471a3f765
-
SHA512
535cfe0243b61ef501c85af51fc9d195004c6a64dd43aa573f871bdd866f5b8d5a1701cf7da5959e1e0c3042ac310d8bcefe4ebb6c5e53b4fc3f2e8db4150938
-
SSDEEP
393216:6BxFJBdE5EsamTr5j+W22hAfr20Xs+sgaVMkch4iMkch4DlFA6sU0sUisZsy0GQe:yxFDdnsag42hAfr20Xs+sgaVMkch4iMF
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-26_79e3807e8c84d62b6040a3a1f394499a_mafia
Files
-
2024-05-26_79e3807e8c84d62b6040a3a1f394499a_mafia.exe windows:5 windows x86 arch:x86
16e2f60bc18856b657d2d4743ab1b345
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetHandleCount
QueryPerformanceCounter
CompareStringW
WriteConsoleW
GetEnvironmentStringsW
CreateFileW
SetEnvironmentVariableA
DeleteFileW
GetDiskFreeSpaceW
LockFileEx
GetTempPathW
GetFileAttributesW
GetVersionExW
FormatMessageW
InterlockedCompareExchange
GetFullPathNameW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
LCMapStringW
HeapCreate
GetStdHandle
IsProcessorFeaturePresent
GetStringTypeW
IsValidCodePage
IsDebuggerPresent
UnhandledExceptionFilter
HeapSize
HeapQueryInformation
GetFileType
SetStdHandle
ExitThread
ExitProcess
VirtualQuery
VirtualAlloc
HeapReAlloc
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
DecodePointer
EncodePointer
FindResourceExW
GetDiskFreeSpaceA
VirtualProtect
SearchPathA
GetProfileIntA
GetTempFileNameA
SetErrorMode
GetNumberFormatA
GetFileSizeEx
GetFileAttributesExA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
lstrcmpiA
lstrcpyA
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
GetACP
GlobalFlags
GetThreadLocale
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FileTimeToLocalFileTime
GetPrivateProfileIntA
ResumeThread
SetThreadPriority
GetCurrentThread
GetUserDefaultUILanguage
ConvertDefaultLocale
GetSystemDefaultUILanguage
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetModuleHandleW
InterlockedDecrement
GetModuleFileNameW
ReleaseActCtx
CreateActCtxW
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
LoadLibraryW
ActivateActCtx
DeactivateActCtx
lstrcmpW
CopyFileA
GlobalSize
FormatMessageA
lstrlenW
MulDiv
lstrlenA
GlobalLock
GlobalUnlock
FreeResource
WaitForSingleObject
GetSystemInfo
GlobalFree
GlobalAlloc
GetPrivateProfileStringA
DeviceIoControl
LocalAlloc
GetVersionExA
DeleteFileA
WritePrivateProfileStringA
CreateDirectoryA
GetWindowsDirectoryA
SetFileAttributesA
GetFileAttributesA
GetModuleHandleA
FindResourceA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
CreateThread
GetTickCount
CreateMutexA
FreeLibrary
GetProcAddress
LoadLibraryA
RaiseException
GetTempPathA
SetUnhandledExceptionFilter
CreateProcessA
SetFileTime
WriteFile
SystemTimeToFileTime
Sleep
FileTimeToSystemTime
GetSystemTime
Process32Next
OpenProcess
TerminateProcess
Process32First
CreateToolhelp32Snapshot
GetFileTime
GetFileSize
ReadFile
SetFilePointerEx
CloseHandle
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
GetLocalTime
GetLastError
GetCommandLineA
OpenMutexA
LocalFree
GetModuleFileNameA
SetLastError
MultiByteToWideChar
WideCharToMultiByte
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
AreFileApisANSI
user32
DestroyIcon
SetLayeredWindowAttributes
EnumDisplayMonitors
SetRectEmpty
DeleteMenu
WaitMessage
ReleaseCapture
LoadCursorW
SetCapture
UnregisterClassA
SystemParametersInfoA
DestroyMenu
GetMenuItemInfoA
GetSysColorBrush
RealChildWindowFromPoint
OffsetRect
CharNextA
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
WindowFromPoint
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
IntersectRect
InflateRect
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
CheckDlgButton
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
UpdateWindow
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
CopyRect
SetWindowPlacement
GetWindowPlacement
GetDlgCtrlID
CharUpperA
CopyAcceleratorTableA
IsRectEmpty
DefWindowProcA
CallWindowProcA
GetWindowRect
LoadBitmapW
GetDC
GetClientRect
PtInRect
GetMenu
SetWindowLongA
SetWindowPos
GetWindow
GetMenuState
GetMenuStringA
AppendMenuA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
SetRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RedrawWindow
GetMenuDefaultItem
CreatePopupMenu
MapVirtualKeyA
GetAsyncKeyState
InvertRect
DrawFocusRect
HideCaret
EnableScrollBar
NotifyWinEvent
GetIconInfo
GetNextDlgTabItem
EndDialog
MessageBoxA
FillRect
DrawIcon
GetSystemMetrics
IsIconic
LoadIconW
wsprintfA
SetTimer
KillTimer
CopyImage
LoadImageA
DrawIconEx
TranslateAcceleratorA
BringWindowToTop
InsertMenuItemA
LoadAcceleratorsA
LoadMenuA
ReuseDDElParam
UnpackDDElParam
IsZoomed
SetWindowRgn
EnableWindow
InvalidateRect
GetKeyState
SendMessageA
GetFocus
LoadCursorA
SetCursor
SetClassLongA
LoadMenuW
GetSystemMenu
DrawStateA
GetParent
GetCursorPos
DrawEdge
DrawFrameControl
ToAsciiEx
GetKeyboardLayout
GetKeyboardState
LoadAcceleratorsW
CreateAcceleratorTableA
SetCursorPos
LockWindowUpdate
RegisterClipboardFormatA
GetKeyNameTextA
OpenClipboard
SetClipboardData
CloseClipboard
EmptyClipboard
LoadImageW
DestroyAcceleratorTable
IsCharLowerA
MapVirtualKeyExA
UnionRect
UpdateLayeredWindow
MonitorFromPoint
IsMenu
PostThreadMessageA
DefFrameProcA
DefMDIChildProcA
DrawMenuBar
TranslateMDISysAccel
CreateMenu
SetMenuDefaultItem
IsClipboardFormatAvailable
FrameRect
GetUpdateRect
CopyIcon
CharUpperBuffA
GetDoubleClickTime
SubtractRect
DestroyCursor
GetWindowRgn
SetParent
gdi32
DeleteObject
SelectClipRgn
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
CreateBitmap
SelectPalette
GetObjectType
CreatePen
CreateSolidBrush
CreateHatchBrush
CreateFontIndirectA
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
PatBlt
DPtoLP
GetBkColor
GetTextColor
GetTextExtentPoint32A
GetTextMetricsA
CreateDIBitmap
EnumFontFamiliesA
GetTextCharsetInfo
GetRgnBox
CreatePalette
GetPaletteEntries
GetNearestPaletteIndex
RealizePalette
GetSystemPaletteEntries
CreateDIBSection
CreateRoundRectRgn
CreatePolygonRgn
CreateEllipticRgn
Polyline
Ellipse
Polygon
SetDIBColorTable
SetPixel
Rectangle
OffsetRgn
EnumFontFamiliesExA
LPtoDP
GetWindowOrgEx
GetViewportOrgEx
PtInRegion
FillRgn
FrameRgn
GetBoundsRect
ExtFloodFill
SetPaletteEntries
SetPixelV
GetTextFaceA
SetLayout
GetLayout
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
CreateDCA
CopyMetaFileA
GetStockObject
GetObjectA
CreateRectRgn
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
StretchBlt
CreateCompatibleDC
msimg32
TransparentBlt
AlphaBlend
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegEnumValueA
RegCloseKey
RegQueryValueExA
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
shell32
ShellExecuteA
CommandLineToArgvW
ShellExecuteExA
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHAppBarMessage
DragQueryFileA
DragFinish
SHGetFileInfoA
comctl32
_TrackMouseEvent
ImageList_GetIconSize
shlwapi
PathFileExistsA
PathRemoveFileSpecA
PathIsDirectoryA
StrToIntA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathRemoveFileSpecW
PathIsUNCA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoInitializeEx
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
IsAccelerator
OleLockRunning
OleIsCurrentClipboard
OleFlushClipboard
DoDragDrop
CoRevokeClassObject
CoRegisterMessageFilter
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
OleGetClipboard
CLSIDFromString
CLSIDFromProgID
CoCreateGuid
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
CreateStreamOnHGlobal
oleaut32
VarBstrFromDate
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
SafeArrayCreate
SafeArrayGetElemsize
SafeArrayAccessData
SafeArrayUnaccessData
OleCreateFontIndirect
LoadRegTypeLi
DispCallFunc
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysFreeString
SysAllocString
oledlg
ord8
urlmon
URLDownloadToFileA
gdiplus
GdipCloneImage
GdipDisposeImage
GdipCreateFromHDC
GdipAlloc
GdipDrawImageRectI
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
GdipSetInterpolationMode
GdipGetImageWidth
GdipGetImageHeight
GdipLoadImageFromFile
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromStream
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdiplusStartup
GdipGetImageGraphicsContext
GdipDrawImageI
GdipGetImagePixelFormat
GdipFree
GdipDeleteGraphics
GdipBitmapUnlockBits
dbghelp
MiniDumpWriteDump
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
ws2_32
WSACleanup
connect
inet_addr
htons
socket
gethostbyname
WSAStartup
setsockopt
send
select
recv
closesocket
gethostname
inet_ntoa
__WSAFDIsSet
wininet
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetQueryDataAvailable
InternetSetOptionExA
iphlpapi
GetAdaptersInfo
oleacc
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
imm32
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
winmm
PlaySoundA
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 322KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12.3MB - Virtual size: 12.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 218KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ