C:\tmp\COMPILE\Win_R5.3\Windows\STS_Manager\Release\test_clog.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_1b84990ad8e9f105b739f8b6b96592f0_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-27_1b84990ad8e9f105b739f8b6b96592f0_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-27_1b84990ad8e9f105b739f8b6b96592f0_mafia
-
Size
161KB
-
MD5
1b84990ad8e9f105b739f8b6b96592f0
-
SHA1
9d2390ed0ca7c2f8a563ac1ac2a7ba5f6fb106c0
-
SHA256
1040a8ae4798ca93374c531c88b5a445bf64cba67d490b3574855f9e662e93f2
-
SHA512
7f2f52e636659b6b3bb9ffde801aa172ff7d297031c5c52b2d88acd848806685a5e4d1b5c52f76f69477552fe04071017871e9aa9ec63f1fdb9f5b94dfdbada3
-
SSDEEP
3072:ptRzmt48FGij/aYO7GeHJqq3+oF0heNk5fK2xtUZKu00Y+X:7Rzmt48FGij/NO7b+3vMStPX0Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-27_1b84990ad8e9f105b739f8b6b96592f0_mafia
Files
-
2024-05-27_1b84990ad8e9f105b739f8b6b96592f0_mafia.exe windows:5 windows x86 arch:x86
c72cb3cf76012df5223977f3a0bc97c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSAStartup
WSACleanup
gethostname
kernel32
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
CreateProcessA
EnterCriticalSection
SetUnhandledExceptionFilter
CreateFileW
CompareStringW
GetCurrentThreadId
RtlUnwind
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
GetLastError
HeapFree
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
DeleteFileA
GetCurrentProcessId
HeapAlloc
GetCommandLineA
HeapSetInformation
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
CloseHandle
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
SetEnvironmentVariableA
IsProcessorFeaturePresent
WideCharToMultiByte
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
WriteFile
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapCreate
HeapDestroy
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileAttributesA
MultiByteToWideChar
ReadFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
SetFilePointer
SetStdHandle
HeapReAlloc
LCMapStringW
GetStringTypeW
HeapSize
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetDriveTypeW
SetEndOfFile
GetProcessHeap
GetExitCodeProcess
WaitForSingleObject
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ