W:\Boinc-dev\boinc\win_build\Build\Win32\Release\worker_6.1_windows_intelx86.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-05_c06630582e776b214ca2630235f8ff42_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-05_c06630582e776b214ca2630235f8ff42_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-05_c06630582e776b214ca2630235f8ff42_mafia
-
Size
909KB
-
MD5
c06630582e776b214ca2630235f8ff42
-
SHA1
297b3d33095c92f5865e2ca22a5acb4595ca127c
-
SHA256
3fb71134288b8b978f47f8e545afa6735cacb1768defe29096ffa2fc9df3fc6d
-
SHA512
179d2f655333f75b7e4c6dbb08a63f3f0f9ae6ef78083e4cddbd08d87b0c18edceb660dd53baa17a50788e95e639a9f8ca684440094b884bd0ad8d8bfe436218
-
SSDEEP
12288:qop+j/Vdv7niOlvpd8qzBOhpyDe6IkyWAQ+YTr2uiy9DMZEeZyJAjVfUIRzV:iVd2uGyqksQ+YuoM9wJIfUuzV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-05_c06630582e776b214ca2630235f8ff42_mafia
Files
-
2024-06-05_c06630582e776b214ca2630235f8ff42_mafia.exe windows:5 windows x86 arch:x86
0f17bd7cbb1fd70cdd19694fecf16651
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
GetCommandLineA
HeapSetInformation
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FatalAppExitA
SetFilePointer
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
GetModuleFileNameW
HeapCreate
HeapDestroy
Sleep
ReadFile
CloseHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteConsoleW
MultiByteToWideChar
SetStdHandle
HeapSize
HeapReAlloc
CreateFileA
LCMapStringW
GetStringTypeW
CreateFileW
SetEndOfFile
GetProcessHeap
GetUserDefaultLCID
RtlUnwind
EnumSystemLocalesA
IsValidLocale
InterlockedCompareExchange
InitializeCriticalSection
CreateMutexA
WaitForSingleObject
ReleaseMutex
OpenProcess
DebugBreak
SuspendThread
ResumeThread
SetThreadPriority
CreateThread
DuplicateHandle
GetThreadTimes
GetProcessTimes
GetExitCodeProcess
CreateProcessA
FindClose
FindNextFileA
FindFirstFileA
CopyFileA
MoveFileExA
RemoveDirectoryA
SetFilePointerEx
GetDiskFreeSpaceExA
CreateDirectoryA
LocalFree
MapViewOfFile
LocalAlloc
CreateFileMappingA
GetVersionExA
OpenFileMappingA
UnmapViewOfFile
Thread32Next
OpenThread
Thread32First
CreateToolhelp32Snapshot
SetCurrentDirectoryA
ExpandEnvironmentStringsA
FormatMessageW
GetModuleHandleA
OutputDebugStringA
SetEvent
WaitForMultipleObjects
GetThreadContext
CreateEventA
LoadLibraryA
GetEnvironmentVariableA
GetCurrentDirectoryA
GetTimeFormatA
GetDateFormatA
GetLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
GetDriveTypeW
GetFullPathNameA
ExitThread
GetTimeZoneInformation
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
SetCurrentDirectoryW
CompareStringW
SetEnvironmentVariableA
RaiseException
HeapFree
GetLastError
HeapAlloc
DecodePointer
ExitProcess
GetModuleHandleW
GetLocaleInfoA
GetProcAddress
user32
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
GetForegroundWindow
advapi32
FreeSid
RegQueryValueExA
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
RegOpenKeyExA
shell32
SHGetFolderPathA
Sections
.text Size: 676KB - Virtual size: 676KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ