D:\depot\_build\tc\SAPSetup\NWSapStp_09_REL\gen\dbg\java\sub\_nwsapsetup\e\01\src\OptU\ntintel\SapSx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_acfb3b31339507f1e3dd012e4de1d81a_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-28_acfb3b31339507f1e3dd012e4de1d81a_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-28_acfb3b31339507f1e3dd012e4de1d81a_mafia
-
Size
565KB
-
MD5
acfb3b31339507f1e3dd012e4de1d81a
-
SHA1
80110dec50ce98bd7a3815acaba69d9ef3121428
-
SHA256
401499f10af351b560612912f09d2595386cc92f766a00d5767be214165795b7
-
SHA512
9f8756e73f2478e56528edaebfac7d3e1e26479b394509c2ab490669bcc05b1d2b4a4ce0e44818c7f608646929df63642dc43b1f657c98db63946ef6ff8a6be7
-
SSDEEP
12288:6wb8IyWrbxZ3NU/zDPDkec87BqoLX9dLNjadCyZ6i4h:gIyWrbxZ3QD7keZ7BVX9idCyZv4h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-28_acfb3b31339507f1e3dd012e4de1d81a_mafia
Files
-
2024-05-28_acfb3b31339507f1e3dd012e4de1d81a_mafia.exe windows:5 windows x86 arch:x86
27537535880ee8a4475bf8471482ab19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Module32NextW
Module32FirstW
Process32NextW
Process32FirstW
FindResourceExW
LockResource
Sleep
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
lstrlenW
WideCharToMultiByte
ResumeThread
InterlockedIncrement
CreateThread
InterlockedDecrement
RaiseException
FlushInstructionCache
SetEnvironmentVariableW
GetCommandLineW
RemoveDirectoryW
GetCurrentThreadId
DeleteFileW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
LeaveCriticalSection
EnterCriticalSection
SetLastError
CloseHandle
GetCurrentProcess
SetEnvironmentVariableA
IsValidLocale
LoadLibraryA
GetLastError
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
WriteConsoleW
SetEndOfFile
SetStdHandle
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetACP
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
FindClose
GetFileAttributesW
CreateFileW
GetFileInformationByHandle
SetFileAttributesW
GetFileSizeEx
GetTempPathW
GetCurrentDirectoryW
GetTempFileNameW
CopyFileW
MoveFileW
FindFirstFileW
WriteFile
ReadFile
SetFilePointer
CreateDirectoryW
GetDriveTypeW
GetWindowsDirectoryW
GetSystemDirectoryW
GetNativeSystemInfo
GetComputerNameW
ExpandEnvironmentStringsW
GetEnvironmentVariableW
FormatMessageW
LocalFree
GetPrivateProfileIntW
GetPrivateProfileStringW
LocalAlloc
LoadLibraryW
WaitForSingleObject
InitializeCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
CreateMutexW
OpenMutexW
ReleaseMutex
SetErrorMode
GetCurrentProcessId
GlobalMemoryStatusEx
FlushFileBuffers
DeviceIoControl
TerminateProcess
SetCurrentDirectoryW
GetCurrentThread
VirtualQuery
ReadProcessMemory
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
lstrlenA
CreateProcessW
CreatePipe
GetExitCodeProcess
GetFileSize
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InterlockedPushEntrySList
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
HeapDestroy
HeapReAlloc
HeapSize
HeapSetInformation
GetStartupInfoW
GetFullPathNameW
GetSystemTimeAsFileTime
GetFileType
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
LCMapStringW
CompareStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetHandleCount
GetStdHandle
ExitProcess
GetLocaleInfoW
CreateToolhelp32Snapshot
user32
UnregisterClassA
EndDialog
SetWindowTextW
GetDlgItem
SetWindowPos
MapWindowPoints
DestroyMenu
WaitForInputIdle
ShowWindow
GetSystemMenu
PostMessageW
IsWindow
LoadIconW
DestroyWindow
DefWindowProcW
CharNextW
DialogBoxParamW
GetActiveWindow
SetWindowLongW
GetDesktopWindow
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
SendMessageW
GetClientRect
GetParent
AppendMenuW
advapi32
GetUserNameW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ole32
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
oleaut32
VarUI4FromStr
shlwapi
StrCpyW
AssocQueryStringW
comctl32
InitCommonControlsEx
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
netapi32
NetApiBufferFree
NetWkstaGetInfo
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
FindExecutableW
Sections
.text Size: 379KB - Virtual size: 379KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ