C:\Project_win8\build_src\build1313\SxS\src\Release\Toolbox.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_299d13625d39a7b10cde456639e82ad0_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-07_299d13625d39a7b10cde456639e82ad0_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-07_299d13625d39a7b10cde456639e82ad0_mafia
-
Size
2.8MB
-
MD5
299d13625d39a7b10cde456639e82ad0
-
SHA1
400bf920875a4d38db0f5fe98a5a4d25fe82c07f
-
SHA256
8cbfea6f24b0fe4563f444c6cca29dcfb5030d274c78c09509d66cb591767d71
-
SHA512
a8e92c52da5b117eedd283a8246b1586a6a69ba94735a20607d0f7e45a9ed3f6ce53f022e4a7c59ddb31335aea619417a1296db116d777e6971a0087d76e0fa0
-
SSDEEP
49152:WJ5DtsweSR2B9mvTkV5X/b4MN3BRupqyJqK3lyCc1Y8:U+3SR2B9mvUT4C3BRupj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-07_299d13625d39a7b10cde456639e82ad0_mafia
Files
-
2024-06-07_299d13625d39a7b10cde456639e82ad0_mafia.exe windows:5 windows x86 arch:x86
52e99cd2f3a1814333d7905233a91843
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetExitCodeProcess
GetCurrentProcess
TerminateThread
CreateEventW
OpenEventW
ResetEvent
SetEvent
GetLocalTime
GetSystemTime
GetFileAttributesW
OpenMutexW
CreateDirectoryW
GetShortPathNameW
GetFileSizeEx
PeekNamedPipe
GetEnvironmentVariableW
TryEnterCriticalSection
WaitForMultipleObjects
CreatePipe
GetStartupInfoW
GlobalMemoryStatusEx
OpenFileMappingW
FlushViewOfFile
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetUserDefaultLCID
GetLocaleInfoW
FindFirstFileW
FindNextFileW
FindClose
DeleteFileW
WideCharToMultiByte
GetComputerNameExW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetUserDefaultLangID
LocalAlloc
GlobalAlloc
ProcessIdToSessionId
GlobalLock
GlobalUnlock
GlobalFree
GetFileTime
DeviceIoControl
GetSystemDirectoryW
MoveFileExW
CopyFileW
SetFileAttributesW
FileTimeToSystemTime
SystemTimeToFileTime
CreateFileMappingW
GetPrivateProfileStringA
WritePrivateProfileStringW
WritePrivateProfileStringA
GetUserGeoID
GetGeoInfoW
CreateSemaphoreW
ReleaseSemaphore
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
GetModuleHandleW
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
HeapDestroy
HeapAlloc
GetExitCodeThread
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
GetTimeFormatW
GetDateFormatW
HeapSetInformation
GetSystemTimeAsFileTime
ExitThread
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
IsProcessorFeaturePresent
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
WriteConsoleW
SetStdHandle
CompareStringW
SetEnvironmentVariableA
lstrlenW
CreateThread
GetDiskFreeSpaceExW
GetTempPathW
CreateProcessW
GetVersionExW
QueryPerformanceFrequency
FreeLibrary
GetProcAddress
LoadLibraryW
UnmapViewOfFile
WaitForSingleObject
CreateMutexW
FormatMessageW
SearchPathW
GetLongPathNameW
GetTempFileNameW
GetFileAttributesExW
OpenProcess
GetCurrentThreadId
OutputDebugStringW
CloseHandle
WriteFile
SetFilePointer
CreateFileW
GetTickCount
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
GetCurrentProcessId
ExpandEnvironmentStringsW
InitializeCriticalSection
QueryPerformanceCounter
SetLastError
ReleaseMutex
HeapFree
MapViewOfFile
LoadLibraryA
GetOverlappedResult
CancelIo
GetFileSize
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleFileNameW
Sleep
LocalFree
GetCommandLineW
GetLastError
DeleteCriticalSection
GetPrivateProfileStringW
SetEndOfFile
CreateFileA
GetDateFormatA
GetTimeFormatA
GetPrivateProfileIntW
FreeResource
GetUserDefaultUILanguage
MoveFileW
RemoveDirectoryW
GetFullPathNameW
user32
CreateWindowExW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
DestroyWindow
GetDesktopWindow
PostQuitMessage
MessageBoxW
GetKeyState
SendMessageCallbackW
LoadIconW
SystemParametersInfoW
SetTimer
PeekMessageW
MsgWaitForMultipleObjects
GetAsyncKeyState
WaitForInputIdle
MsgWaitForMultipleObjectsEx
GetSystemMetrics
AllowSetForegroundWindow
ExitWindowsEx
CloseDesktop
DispatchMessageW
OpenDesktopW
SetThreadDesktop
GetThreadDesktop
SetProcessWindowStation
GetProcessWindowStation
CloseWindowStation
OpenWindowStationW
RegisterWindowMessageW
TranslateMessage
DestroyIcon
SetForegroundWindow
ShowWindow
IsWindowVisible
GetLastActivePopup
GetMessageW
shell32
SHGetSpecialFolderPathW
ExtractIconW
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
ole32
GetHGlobalFromStream
CoCreateGuid
OleInitialize
OleUninitialize
PropVariantClear
CoUninitialize
CoInitializeEx
OleRun
CLSIDFromProgID
CreateStreamOnHGlobal
CoInitialize
CLSIDFromString
CoCreateInstance
StringFromCLSID
CoTaskMemFree
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathIsFileSpecW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
psapi
EnumProcessModules
GetModuleBaseNameW
EnumProcesses
GetModuleFileNameExW
winspool.drv
ord204
EnumJobsW
DeletePrinter
GetJobW
SetJobW
SetPrinterW
EnumPrinterDriversW
GetPrinterDriverDirectoryW
DeletePrinterDriverExW
GetPrinterW
XcvDataW
StartDocPrinterW
GetPrinterDriverW
SetPrinterDataExW
GetPrinterDataExW
EnumPrintersW
ord203
AddMonitorW
EnumMonitorsW
EnumPortsW
StartPagePrinter
WritePrinter
EndPagePrinter
EndDocPrinter
FindFirstPrinterChangeNotification
FindNextPrinterChangeNotification
FindClosePrinterChangeNotification
DocumentPropertiesW
DeleteMonitorW
OpenPrinterW
ClosePrinter
advapi32
CryptReleaseContext
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
RegSetValueExW
CheckTokenMembership
OpenProcessToken
RegQueryValueExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
RegDeleteKeyW
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
BackupEventLogW
CloseEventLog
RevertToSelf
DuplicateToken
ImpersonateLoggedOnUser
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenEventLogW
FreeSid
AllocateAndInitializeSid
CreateProcessAsUserW
ChangeServiceConfigW
QueryServiceConfigW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceStatus
StartServiceW
ControlService
GetUserNameW
oleaut32
SafeArrayLock
VariantChangeType
SafeArrayRedim
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
SafeArrayGetLBound
GetErrorInfo
SafeArrayCreate
DispCallFunc
VariantInit
SysStringLen
VariantCopy
VariantClear
SysFreeString
SysAllocString
SafeArrayUnlock
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
SafeArrayGetElement
ws2_32
send
getaddrinfo
freeaddrinfo
WSAAddressToStringW
recv
accept
listen
bind
WSADuplicateSocketW
WSACloseEvent
closesocket
shutdown
WSAResetEvent
WSAEnumNetworkEvents
WSAConnect
WSAEventSelect
WSACreateEvent
setsockopt
WSASocketW
WSACleanup
WSAStringToAddressW
WSAStartup
WSAGetLastError
secur32
GetUserNameExW
netapi32
NetWkstaUserGetInfo
NetApiBufferFree
gdi32
SetEnhMetaFileBits
GetDeviceCaps
StartPage
StartDocW
CreateDCW
PlayEnhMetaFile
DeleteEnhMetaFile
EndPage
EndDoc
DeleteDC
wininet
InternetErrorDlg
HttpAddRequestHeadersW
InternetReadFileExA
HttpQueryInfoA
HttpSendRequestW
InternetSetOptionW
InternetOpenW
InternetConnectW
HttpOpenRequestW
InternetCloseHandle
InternetQueryOptionW
HttpQueryInfoW
iphlpapi
IcmpCloseHandle
GetAdaptersInfo
GetAdaptersAddresses
GetIfEntry
GetInterfaceInfo
IpReleaseAddress
IpRenewAddress
AddIPAddress
DeleteIPAddress
IcmpCreateFile
IcmpSendEcho
NotifyAddrChange
crypt32
CertCloseStore
CertDeleteCertificateFromStore
CertAddEncodedCertificateToStore
CertOpenStore
CryptUnprotectData
Exports
Exports
Create_Config_JobFactory
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 234KB - Virtual size: 234KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ