C:\BuildAgent\work\52fbca0759d0cd8c\iclsClient\Release\HeciServer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_e50f1e8ec65b507fbfdc488143c27831_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-01_e50f1e8ec65b507fbfdc488143c27831_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-01_e50f1e8ec65b507fbfdc488143c27831_mafia
-
Size
608KB
-
MD5
e50f1e8ec65b507fbfdc488143c27831
-
SHA1
13e1cb0262a311c27cbd005a1c7a8dfef806d44d
-
SHA256
2fd139c9041e1f02c63a1b6d21a53b1886ffd0decc62b0eac97606424f71261e
-
SHA512
c062056e3208b65f28e8c4fb921e935e61430fd8770b8b8bdff4a24dd768288a887e8c63fccb02a957775d686df22d86bb9b44ad925a848709d4b7791bcec57c
-
SSDEEP
12288:ZPXUatYLLZlrKoyu8w0v2pZzBjuSA9sHsS+3kJsw4X:ZPXntsKruq2bNuSh+UJsw4X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-01_e50f1e8ec65b507fbfdc488143c27831_mafia
Files
-
2024-06-01_e50f1e8ec65b507fbfdc488143c27831_mafia.exe windows:5 windows x86 arch:x86
5e52fc9e802f3b93a94802194281c698
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
shlwapi
PathStripPathW
PathAppendW
kernel32
LoadResource
FindResourceW
LoadLibraryExW
LocalFree
GetCurrentProcess
GetCommandLineW
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
FormatMessageW
TerminateProcess
CreateDirectoryW
GetFileAttributesW
GetCurrentProcessId
CreateMutexW
OpenMutexW
OutputDebugStringW
GetUserDefaultLangID
WriteFile
ReadFile
SizeofResource
GetOverlappedResult
DeviceIoControl
CancelIo
GetFileInformationByHandle
GetFullPathNameA
FlushFileBuffers
SetFilePointer
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
MultiByteToWideChar
FreeLibrary
SetEvent
InterlockedDecrement
CreateEventW
CreateThread
GetCurrentThreadId
Sleep
GetModuleFileNameW
WaitForSingleObject
ReleaseMutex
CloseHandle
lstrcmpiW
GetModuleHandleW
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
lstrlenW
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
SetEndOfFile
GetProcessHeap
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetTimeZoneInformation
LoadLibraryW
GetDriveTypeW
HeapReAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetEnvironmentVariableA
CreateFileW
GetLocalTime
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapCreate
GetStdHandle
ExitProcess
IsProcessorFeaturePresent
CompareStringW
GetDateFormatA
GetTimeFormatA
GetCPInfo
LCMapStringW
GetConsoleMode
GetConsoleCP
GetFileType
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
DeleteFileA
MoveFileA
WideCharToMultiByte
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
EncodePointer
DecodePointer
GetLocaleInfoW
HeapAlloc
HeapFree
RtlUnwind
HeapSetInformation
GetStartupInfoW
user32
CharUpperW
DispatchMessageW
MessageBoxW
PostThreadMessageW
GetMessageW
CharNextW
TranslateMessage
LoadStringW
advapi32
SetKernelObjectSecurity
RegCreateKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
SetEntriesInAclW
AllocateAndInitializeSid
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyW
GetSecurityDescriptorLength
ControlService
DeleteService
CreateServiceW
RegEnumKeyExW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
SetServiceStatus
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
shell32
SHGetFolderPathW
ole32
CoInitializeSecurity
CoReleaseServerProcess
CoAddRefServerProcess
CoCreateInstance
StringFromGUID2
CoUninitialize
CoInitialize
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VariantClear
SafeArrayGetVartype
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
SafeArrayCreateVector
SafeArrayPutElement
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
Sections
.text Size: 414KB - Virtual size: 414KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 91KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
pwymrkm Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE