E:\chromium\src\build\Release\delegate_execute.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_8074feb30f3df219184557fe0e0317cb_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-03_8074feb30f3df219184557fe0e0317cb_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-03_8074feb30f3df219184557fe0e0317cb_mafia
-
Size
877KB
-
MD5
8074feb30f3df219184557fe0e0317cb
-
SHA1
c62d367b269e4a23abecc838275951fbf9fe69cb
-
SHA256
903052aada5b4983750a66d6a253e55701771d3d7a09e3d11b7d5c6a31b6c0ae
-
SHA512
a037ea50ac57a5d1e2a1899f406218557b6c03393a1e77ba2600a97b099f93c463bf3c540ad63fdf1e0abd6df638442048d7ecfcb5fa5bf0d16c9b6782fa0781
-
SSDEEP
12288:z5cjRR6WtOcIQF0e2sobdSPBZH1mRE6f28+h5I+O9KjjJtjc/XAybrac0F:d59w0Zsob8Z+Ea2s+OAfJtg/QyyhF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-03_8074feb30f3df219184557fe0e0317cb_mafia
Files
-
2024-06-03_8074feb30f3df219184557fe0e0317cb_mafia.exe windows:5 windows x86 arch:x86
056acc84840365dfa831b65c5ecc2ba5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCrackUrlW
kernel32
CreateThread
CreateEventW
SetEvent
GetCommandLineW
GetCurrentThreadId
Sleep
WaitForSingleObject
GetTempPathW
OpenProcess
GetThreadLocale
LockResource
CreateProcessW
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
InterlockedDecrement
InterlockedIncrement
CloseHandle
lstrcmpiW
GetModuleHandleW
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
SetEnvironmentVariableW
OpenMutexW
ExpandEnvironmentStringsW
SetEnvironmentVariableA
GetDriveTypeW
CreateFileA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
SetStdHandle
WriteConsoleW
GetTimeZoneInformation
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
GetLocaleInfoW
IsProcessorFeaturePresent
HeapCreate
GetCPInfo
LCMapStringW
RtlUnwind
GetProcessHeap
HeapReAlloc
ExitProcess
GetFullPathNameW
GetConsoleMode
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
GetCurrentProcess
GetCurrentProcessId
GetTickCount
ReleaseMutex
SetLastError
CreateMutexW
SetFilePointer
CreateFileW
WriteFile
OutputDebugStringA
FormatMessageA
GetModuleHandleA
UnmapViewOfFile
GetFileAttributesW
CreateDirectoryW
GetCurrentDirectoryW
ReadFile
MapViewOfFile
CreateFileMappingW
VirtualQueryEx
HeapSetInformation
GetProcessId
TerminateProcess
GetStdHandle
GetSystemTimeAsFileTime
GetUserDefaultUILanguage
GetEnvironmentVariableW
GetUserDefaultLangID
InterlockedCompareExchange
IsDebuggerPresent
QueryPerformanceCounter
GetNativeSystemInfo
GetVersionExW
GetSystemDirectoryW
GetWindowsDirectoryW
InterlockedExchangeAdd
SetUnhandledExceptionFilter
SetEndOfFile
FlushFileBuffers
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
RtlCaptureContext
LoadLibraryW
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GlobalLock
GlobalUnlock
GetPrivateProfileStringW
WideCharToMultiByte
EncodePointer
DecodePointer
GetVersionExA
CompareStringW
HeapAlloc
HeapFree
UnhandledExceptionFilter
GetStartupInfoW
GetConsoleCP
user32
GetAsyncKeyState
CharUpperW
GetWindowThreadProcessId
IsImmersiveProcess
AllowSetForegroundWindow
CharNextW
FindWindowExW
TranslateMessage
DispatchMessageW
MessageBoxW
GetSystemMetrics
RegisterClipboardFormatW
UnregisterClassA
GetMessageW
PostThreadMessageW
advapi32
GetSidSubAuthorityCount
GetTokenInformation
OpenProcessToken
RegQueryValueExW
ConvertSidToStringSidW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSidSubAuthority
ole32
StringFromGUID2
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoResumeClassObjects
CoReleaseServerProcess
CoCreateInstance
CoAddRefServerProcess
ReleaseStgMedium
CoInitializeEx
oleaut32
SysFreeString
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
VarUI4FromStr
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
shlwapi
PathFindExtensionW
UrlCreateFromPathA
PathIsUNCA
PathFileExistsA
PathFindFileNameW
UrlCreateFromPathW
PathIsUNCW
PathFileExistsW
PathRemoveExtensionW
Sections
.text Size: 553KB - Virtual size: 553KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ