D:\svnwork\stormplayer\trunk\Setup\BF_NewInstall\src\BF_InstallEngine\bin\Release\B5_Install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_8f3385af4112c2d544cd8673d044eefb_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-30_8f3385af4112c2d544cd8673d044eefb_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-30_8f3385af4112c2d544cd8673d044eefb_mafia
-
Size
19.2MB
-
MD5
8f3385af4112c2d544cd8673d044eefb
-
SHA1
b20da14a02cb9dd62c7c951ed60ae1c34326a689
-
SHA256
394d6f2c321b6d5e90080146f10bcdc1edfb7b4871a8e1dc8b30aa38305ca62d
-
SHA512
8828e69e14946b94cd4446a1fb509a9c1db970d8b140b3a216fd972efe4e8883fb892122340fea99e0c537a9b9e8ae5966c969ac6b0237bfa6a3e13cf4e24bb8
-
SSDEEP
393216:QqUBMfiqkuJO07gWsDon6JQAbvldjweZnhhfBIymdCJkeN6s:KMln6ZTjweFN1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-30_8f3385af4112c2d544cd8673d044eefb_mafia
Files
-
2024-05-30_8f3385af4112c2d544cd8673d044eefb_mafia.exe windows:5 windows x86 arch:x86
e0b8ebc011e7b0242e80d4aa412deccc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
LockResource
SetErrorMode
GetLocalTime
CreateToolhelp32Snapshot
Process32FirstW
FindResourceExW
Process32NextW
OpenProcess
TerminateProcess
lstrcpynW
GetFileAttributesW
lstrcatW
lstrcmpiW
HeapAlloc
GetProcessHeap
GetModuleHandleA
HeapFree
MoveFileExW
CopyFileW
GetPrivateProfileStringW
WritePrivateProfileStringW
FlushInstructionCache
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
SetLastError
InitializeCriticalSectionAndSpinCount
RaiseException
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
lstrcmpW
GlobalFree
TerminateThread
GetDiskFreeSpaceExW
CreateMutexW
OpenMutexW
OutputDebugStringW
SizeofResource
FindResourceW
CreateProcessW
CreateEventW
CreateSemaphoreW
ResetEvent
ReleaseSemaphore
InitializeCriticalSection
SetEvent
WaitForSingleObject
VirtualAlloc
VirtualFree
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
GlobalMemoryStatus
GetModuleHandleW
GetSystemInfo
FileTimeToSystemTime
SetEndOfFile
SetFilePointer
GetFileSize
GetLogicalDriveStringsW
FindNextFileW
FindFirstFileW
FindClose
GetTempFileNameW
GetTempPathW
SearchPathW
GetCurrentDirectoryW
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
CreateFileA
SetStdHandle
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FlushFileBuffers
GetConsoleCP
RtlUnwind
lstrlenW
GetFullPathNameW
DeleteFileW
CreateDirectoryW
MoveFileW
RemoveDirectoryW
SetFileAttributesW
SetFileTime
CreateFileW
GetSystemDirectoryW
GetWindowsDirectoryW
LocalFree
FormatMessageW
GetModuleFileNameW
LoadLibraryW
LoadLibraryExW
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
SetConsoleMode
GetConsoleMode
GetVersionExW
GetCommandLineW
SetFileApisToOEM
GetDriveTypeW
CompareFileTime
SetCurrentDirectoryW
GetProcAddress
FileTimeToLocalFileTime
GetCurrentProcess
GetProcessTimes
GetTickCount
OpenEventW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
CloseHandle
WaitForMultipleObjects
LeaveCriticalSection
EnterCriticalSection
WriteFile
GetStdHandle
SetHandleCount
Sleep
HeapCreate
GetLocaleInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
ExitProcess
CreateThread
ExitThread
EncodePointer
DecodePointer
InterlockedPopEntrySList
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
GetLastError
ReadFile
lstrcpyW
lstrcmpiA
GlobalReAlloc
GetVersion
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
LoadLibraryA
GetVersionExA
HeapDestroy
HeapReAlloc
HeapSize
DeleteCriticalSection
user32
CharLowerW
CharNextA
CharUpperA
SetForegroundWindow
wsprintfW
DefWindowProcW
SetWindowLongW
GetWindowLongW
CallWindowProcW
RegisterClassExW
LoadCursorW
DestroyAcceleratorTable
GetDesktopWindow
ReleaseDC
GetDC
InvalidateRect
InvalidateRgn
GetClientRect
FillRect
ReleaseCapture
SetCapture
CharUpperW
ScreenToClient
GetParent
ClientToScreen
CreateAcceleratorTableW
DestroyWindow
CreateWindowExW
GetClassInfoExW
RedrawWindow
SetWindowPos
CharNextW
UnregisterClassA
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
IsWindowEnabled
TrackMouseEvent
EnableWindow
SetWindowRgn
PostQuitMessage
KillTimer
SetTimer
EqualRect
SetMenuItemInfoW
RemoveMenu
MoveWindow
GetClassNameW
GetMenuState
SetMenuInfo
GetMenuInfo
GetClassNameA
CallNextHookEx
GetCursorPos
SetWindowsHookExW
SetPropA
SetClassLongW
GetClassLongW
IsWindowVisible
UnhookWindowsHookEx
GetMenuItemInfoW
OffsetRect
CopyRect
InflateRect
SetWindowTextA
FindWindowA
GetWindowDC
GetMenuItemCount
SetParent
UpdateWindow
GetPropA
IsZoomed
GetWindowRect
LoadIconW
FindWindowExW
SendMessageTimeoutW
FindWindowW
MessageBoxW
PostMessageW
EnableMenuItem
GetSystemMenu
EndDialog
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
BeginPaint
EndPaint
IsChild
GetFocus
SetFocus
GetWindow
GetDlgItem
SendMessageW
IsWindow
RegisterWindowMessageW
GetSysColor
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
SystemParametersInfoW
ShowWindow
SetRectEmpty
DrawTextW
MonitorFromWindow
GetMonitorInfoW
GetSystemMetrics
IsDialogMessageW
IsIconic
MapWindowPoints
GetWindowThreadProcessId
IsRectEmpty
SetRect
PtInRect
SetCursor
DrawIconEx
DialogBoxParamW
gdi32
DeleteDC
GetStockObject
DeleteObject
SetTextColor
SetBkColor
ExtTextOutW
CreatePen
CreateFontIndirectW
SetBkMode
GetClipBox
ExcludeClipRect
Rectangle
GetRgnBox
StretchBlt
GetPixel
CreateFontW
RoundRect
GetTextExtentPoint32W
Ellipse
CreateDCW
SelectPalette
RealizePalette
GetDIBits
CreateDIBitmap
CreateDIBSection
ExtCreateRegion
CombineRgn
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDeviceCaps
GetObjectW
CreateSolidBrush
BitBlt
advapi32
RegisterEventSourceA
RegEnumKeyExW
RegSetValueExW
GetUserNameW
BuildExplicitAccessWithNameW
DeleteAce
GetExplicitEntriesFromAclW
SetNamedSecurityInfoW
SetEntriesInAclW
GetNamedSecurityInfoW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
RegOpenKeyW
SetFileSecurityW
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityW
LookupAccountNameW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ReportEventA
DeregisterEventSource
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
shell32
SHFileOperationW
SHCreateDirectoryExW
ShellExecuteW
SHGetSpecialFolderPathW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
ole32
CLSIDFromProgID
CLSIDFromString
CoUninitialize
PropVariantClear
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
StringFromGUID2
CoTaskMemAlloc
CoInitialize
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
oleaut32
OleCreateFontIndirect
SysStringLen
VariantInit
LoadRegTypeLi
SysAllocStringLen
VariantCopy
VariantClear
SysAllocStringByteLen
LoadTypeLi
SysStringByteLen
SysAllocString
SysFreeString
VarUI4FromStr
wininet
InternetGetConnectedState
sensapi
IsNetworkAlive
shlwapi
PathAddBackslashW
PathRemoveFileSpecW
PathStripToRootW
PathSkipRootW
PathIsSameRootW
StrStrIW
StrChrIW
SHStrDupW
PathIsDirectoryW
PathFileExistsW
SHGetValueW
SHSetValueW
SHDeleteKeyW
SHDeleteValueW
StrCmpW
PathAppendW
comctl32
_TrackMouseEvent
InitCommonControlsEx
msimg32
TransparentBlt
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
winhttp
WinHttpOpen
WinHttpSetTimeouts
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpSetOption
WinHttpReadData
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpGetProxyForUrl
WinHttpWriteData
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpGetIEProxyConfigForCurrentUser
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
winmm
timeKillEvent
timeSetEvent
gdiplus
GdipSetSmoothingMode
GdiplusStartup
GdiplusShutdown
GdipCreateFromHDC
GdipImageSelectActiveFrame
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageGetFrameCount
GdipDeleteGraphics
GdipImageGetFrameDimensionsCount
GdipCreateBitmapFromStream
GdipGetImageHeight
GdipGetImageWidth
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipCloneImage
GdipDisposeImage
GdipDrawImageRectRect
GdipFillRectangle
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipImageGetFrameDimensionsList
GdipSetCompositingQuality
GdipSetCompositingMode
GdipAlloc
GdipReleaseDC
GdipFree
GdipSetPixelOffsetMode
GdipSetInterpolationMode
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 221KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 61KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37.6MB - Virtual size: 37.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ