E:\C\Администратор\Рабочий стол\ProjectMVC++\input_crack\quick_smiles\Release\quick_smiles.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-06_54ebb08a372957fb094c5587a3bf829b_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-06_54ebb08a372957fb094c5587a3bf829b_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-06_54ebb08a372957fb094c5587a3bf829b_mafia
-
Size
152KB
-
MD5
54ebb08a372957fb094c5587a3bf829b
-
SHA1
a7f99f648375e045c1e5d51f3a7d13caa635f131
-
SHA256
ce3a610d8b6d81657f10f47b585577acb19abe9c9eb5dcc273a73a8796b3a471
-
SHA512
8666da1204cc8083e21959242bddeebc1b043f76def902b96a6a3c06f8ce13427211094c9c58f9d3da79c69c7aba4076b4975519dd52154b42c8d4867c708509
-
SSDEEP
3072:2nJWGnpzcMmDPNkstryWyerpL7jqnhmMUl9D:eFcMoNk6yWhrpfGnhmf/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-06_54ebb08a372957fb094c5587a3bf829b_mafia
Files
-
2024-06-06_54ebb08a372957fb094c5587a3bf829b_mafia.exe windows:5 windows x86 arch:x86
12352795c20bdbe908569a8269c8700e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenMutexW
ReleaseMutex
GetModuleFileNameW
SetEndOfFile
WriteConsoleW
LoadLibraryW
SetStdHandle
CreateFileW
IsValidLocale
EnumSystemLocalesA
Sleep
GetUserDefaultLCID
HeapReAlloc
GetStringTypeW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetLocaleInfoA
CreateMutexW
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
GetLastError
HeapFree
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ReadFile
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
CloseHandle
HeapSize
ExitProcess
WriteFile
GetLocaleInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetProcessHeap
user32
GetWindowRect
LoadCursorW
GetClientRect
RegisterClassExW
LoadIconW
SetWindowPos
ShowWindow
GetSysColorBrush
CreateWindowExW
CloseWindow
ScreenToClient
PostQuitMessage
UnregisterClassW
PostMessageW
WindowFromPoint
FindWindowW
GetForegroundWindow
GetCursorPos
IsWindow
MessageBoxW
DefWindowProcW
dinput8
DirectInput8Create
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ