H:\chromium\chromium\src\build\Release\delegate_execute.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_bbb7fa3513b325cd723ee307981e3dbe_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-06-01_bbb7fa3513b325cd723ee307981e3dbe_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-01_bbb7fa3513b325cd723ee307981e3dbe_mafia
-
Size
879KB
-
MD5
bbb7fa3513b325cd723ee307981e3dbe
-
SHA1
6c6d285b7f599a6c12513dc1900b2dcf3ad95681
-
SHA256
5f0cee5c7e1f005eb733317d18714618dd76c0bef25f75cd46000dd93003e532
-
SHA512
c0826d663145f54d8adc459ea85c08cd3b4a4a0a8d01e8843b0ad6cb9e59bef8ccfe16e9a17cf268bc998990da67e05dfe38870ef1ee99d099793c008031da63
-
SSDEEP
12288:YFoDD8Ub6a/SKY3PmVsAjJu33GU7K1apU/JLy8LFvacWCSTrtragBjtpT0E9Uy:KnT3FAFu33UayxyWZortZBpLUy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-01_bbb7fa3513b325cd723ee307981e3dbe_mafia
Files
-
2024-06-01_bbb7fa3513b325cd723ee307981e3dbe_mafia.exe windows:5 windows x86 arch:x86
26e59a5abaad08224f5b0b4e26d0c9b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCrackUrlW
kernel32
CreateThread
CreateEventW
SetEvent
GetCommandLineW
GetCurrentThreadId
Sleep
WaitForSingleObject
GetTempPathW
OpenProcess
GetThreadLocale
LockResource
CreateProcessW
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
InterlockedDecrement
InterlockedIncrement
CloseHandle
lstrcmpiW
GetModuleHandleW
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
SetEnvironmentVariableW
OpenMutexW
SetEnvironmentVariableA
CompareStringW
GetDriveTypeW
CreateFileA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
SetStdHandle
WriteConsoleW
GetTimeZoneInformation
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
GetLocaleInfoW
IsProcessorFeaturePresent
HeapCreate
GetCPInfo
LCMapStringW
RtlUnwind
GetProcessHeap
HeapReAlloc
ExitProcess
GetFullPathNameW
GetConsoleMode
GetConsoleCP
GetStartupInfoW
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
GetCurrentProcess
GetCurrentProcessId
GetTickCount
ReleaseMutex
SetLastError
CreateMutexW
SetFilePointer
CreateFileW
WriteFile
OutputDebugStringA
FormatMessageA
GetModuleHandleA
UnmapViewOfFile
GetFileAttributesW
CreateDirectoryW
GetCurrentDirectoryW
ReadFile
MapViewOfFile
CreateFileMappingW
VirtualQueryEx
HeapSetInformation
GetProcessId
TerminateProcess
GetUserDefaultUILanguage
GetStdHandle
GetSystemTimeAsFileTime
ExpandEnvironmentStringsW
GetEnvironmentVariableW
GetUserDefaultLangID
InterlockedCompareExchange
IsDebuggerPresent
QueryPerformanceCounter
GetNativeSystemInfo
GetVersionExW
GetSystemDirectoryW
GetWindowsDirectoryW
InterlockedExchangeAdd
SetUnhandledExceptionFilter
SetEndOfFile
FlushFileBuffers
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
RtlCaptureContext
LoadLibraryW
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GlobalLock
GlobalUnlock
GetPrivateProfileStringW
WideCharToMultiByte
EncodePointer
DecodePointer
HeapAlloc
HeapFree
UnhandledExceptionFilter
user32
GetAsyncKeyState
CharUpperW
GetWindowThreadProcessId
IsImmersiveProcess
AllowSetForegroundWindow
CharNextW
FindWindowExW
TranslateMessage
DispatchMessageW
MessageBoxW
GetSystemMetrics
RegisterClipboardFormatW
GetMessageW
PostThreadMessageW
advapi32
GetSidSubAuthorityCount
GetTokenInformation
OpenProcessToken
RegQueryValueExW
ConvertSidToStringSidW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSidSubAuthority
ole32
StringFromGUID2
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoResumeClassObjects
CoReleaseServerProcess
CoCreateInstance
CoAddRefServerProcess
ReleaseStgMedium
CoInitializeEx
oleaut32
SysFreeString
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
VarUI4FromStr
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
shlwapi
PathFindExtensionW
UrlCreateFromPathA
PathIsUNCA
PathFileExistsA
PathFindFileNameW
UrlCreateFromPathW
PathIsUNCW
PathFileExistsW
PathRemoveExtensionW
Sections
.text Size: 556KB - Virtual size: 555KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ