D:\svnwork\stormplayer\branches\5.26.0627.1111\Setup\BF_NewInstall\src\BF_InstallEngine\bin\Release\B5_Install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-08_ccf9a1e6be278b751170a174ebd02793_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-08_ccf9a1e6be278b751170a174ebd02793_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-08_ccf9a1e6be278b751170a174ebd02793_mafia
-
Size
14.6MB
-
MD5
ccf9a1e6be278b751170a174ebd02793
-
SHA1
b8499b409c380ac415d78667cc92d05d79a8f3a4
-
SHA256
63085cfe9224c62152150df4f42fdb9336f22618262485eda35ea8c2e8de204c
-
SHA512
6ab734b62ce8081b1b1853be8f40601d8f89d10290cb2d9e9631f783f4ad059821630116d936e234c4a21da5806978f7381ca7ce06d6583f2f8d54fe8deab197
-
SSDEEP
196608:Rj1wdRCLtoVdZKa488lA69vAtliy1zeXBpSANpY7rXQiT3yhKd4FFwOWeKs7s2Fw:AZKLXAptliy5ANpID5LwWm7sc5341KHC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-08_ccf9a1e6be278b751170a174ebd02793_mafia
Files
-
2024-06-08_ccf9a1e6be278b751170a174ebd02793_mafia.exe windows:5 windows x86 arch:x86
0c29d570a80e3038e64341f12a32733c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
GetLocalTime
CreateToolhelp32Snapshot
Process32FirstW
FindResourceExW
Process32NextW
OpenProcess
TerminateProcess
lstrcpynW
GetFileAttributesW
lstrcatW
lstrcmpiW
HeapAlloc
GetProcessHeap
GetModuleHandleA
HeapFree
MoveFileExW
CopyFileW
GetPrivateProfileStringW
WritePrivateProfileStringW
FlushInstructionCache
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
SetLastError
CreateFileMappingW
InitializeCriticalSectionAndSpinCount
RaiseException
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
lstrcmpW
GlobalFree
TerminateThread
GetDiskFreeSpaceExW
CreateMutexW
OpenMutexW
OutputDebugStringW
SizeofResource
FindResourceW
CreateProcessW
CreateEventW
CreateSemaphoreW
ResetEvent
ReleaseSemaphore
InitializeCriticalSection
SetEvent
WaitForSingleObject
VirtualAlloc
VirtualFree
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
GlobalMemoryStatus
GetModuleHandleW
GetSystemInfo
FileTimeToSystemTime
SetEndOfFile
SetFilePointer
GetFileSize
GetLogicalDriveStringsW
FindNextFileW
FindFirstFileW
FindClose
GetTempFileNameW
GetTempPathW
SearchPathW
GetCurrentDirectoryW
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
CreateFileA
SetStdHandle
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetStringTypeW
LockResource
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FlushFileBuffers
GetConsoleCP
RtlUnwind
SetHandleCount
lstrlenW
GetFullPathNameW
DeleteFileW
CreateDirectoryW
MoveFileW
RemoveDirectoryW
SetFileAttributesW
SetFileTime
CreateFileW
GetSystemDirectoryW
GetWindowsDirectoryW
LocalFree
FormatMessageW
GetModuleFileNameW
LoadLibraryW
LoadLibraryExW
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
SetConsoleMode
GetConsoleMode
GetVersionExW
GetCommandLineW
SetFileApisToOEM
GetDriveTypeW
CompareFileTime
SetCurrentDirectoryW
GetProcAddress
FileTimeToLocalFileTime
GetCurrentProcess
GetProcessTimes
GetTickCount
OpenEventW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
CloseHandle
WaitForMultipleObjects
LeaveCriticalSection
EnterCriticalSection
WriteFile
GetStdHandle
Sleep
HeapCreate
GetLocaleInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
ExitProcess
CreateThread
ExitThread
EncodePointer
DecodePointer
InterlockedPopEntrySList
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
GetLastError
ReadFile
IsValidLocale
LoadResource
lstrcpyW
lstrcmpiA
GlobalReAlloc
GetVersion
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
LoadLibraryA
GetVersionExA
HeapDestroy
DeleteCriticalSection
user32
CharLowerW
CharNextA
CharUpperA
SetForegroundWindow
wsprintfW
DefWindowProcW
SetWindowLongW
GetWindowLongW
CallWindowProcW
RegisterClassExW
LoadCursorW
DestroyAcceleratorTable
GetDesktopWindow
ReleaseDC
GetDC
InvalidateRect
InvalidateRgn
GetClientRect
FillRect
ReleaseCapture
SetCapture
CharUpperW
ScreenToClient
GetParent
ClientToScreen
CreateAcceleratorTableW
DestroyWindow
CreateWindowExW
GetClassInfoExW
RedrawWindow
SetWindowPos
CharNextW
UnregisterClassA
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
IsWindowEnabled
TrackMouseEvent
EnableWindow
SetWindowRgn
PostQuitMessage
KillTimer
SetTimer
EqualRect
SetMenuItemInfoW
MoveWindow
IsWindow
RemoveMenu
GetMenuState
SetMenuInfo
GetMenuInfo
GetClassNameA
CallNextHookEx
GetCursorPos
SetWindowsHookExW
SetPropA
SetClassLongW
GetClassLongW
IsWindowVisible
UnhookWindowsHookEx
GetMenuItemInfoW
OffsetRect
CopyRect
InflateRect
SetWindowTextA
FindWindowA
GetWindowDC
GetMenuItemCount
SetParent
UpdateWindow
GetPropA
IsZoomed
GetWindowRect
LoadIconW
FindWindowExW
SendMessageTimeoutW
FindWindowW
WaitForInputIdle
MessageBoxW
PostMessageW
EndDialog
GetSystemMenu
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
BeginPaint
EndPaint
IsChild
GetFocus
SetFocus
GetWindow
GetDlgItem
SendMessageW
EnableMenuItem
GetClassNameW
GetSysColor
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
SystemParametersInfoW
ShowWindow
SetRectEmpty
DrawTextW
MonitorFromWindow
GetMonitorInfoW
GetSystemMetrics
IsDialogMessageW
IsIconic
MapWindowPoints
GetWindowThreadProcessId
IsRectEmpty
SetRect
PtInRect
SetCursor
DrawIconEx
DialogBoxParamW
gdi32
DeleteDC
GetStockObject
DeleteObject
SetTextColor
SetBkColor
ExtTextOutW
CreatePen
CreateFontIndirectW
SetBkMode
GetClipBox
ExcludeClipRect
Rectangle
GetRgnBox
StretchBlt
GetPixel
CreateFontW
RoundRect
GetTextExtentPoint32W
Ellipse
CreateDCW
SelectPalette
RealizePalette
GetDIBits
CreateDIBitmap
CreateDIBSection
ExtCreateRegion
CombineRgn
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDeviceCaps
GetObjectW
CreateSolidBrush
BitBlt
advapi32
RegisterEventSourceA
RegEnumKeyExW
RegSetValueExW
GetUserNameW
BuildExplicitAccessWithNameW
DeleteAce
GetExplicitEntriesFromAclW
SetNamedSecurityInfoW
SetEntriesInAclW
GetNamedSecurityInfoW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
RegOpenKeyW
SetFileSecurityW
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityW
LookupAccountNameW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ReportEventA
DeregisterEventSource
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
shell32
SHGetPathFromIDListW
SHCreateDirectoryExW
SHGetFolderPathW
SHFileOperationW
ShellExecuteW
SHGetSpecialFolderPathW
SHGetMalloc
SHBrowseForFolderW
ole32
CLSIDFromString
CoUninitialize
PropVariantClear
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
StringFromGUID2
CoTaskMemAlloc
CoInitialize
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
oleaut32
OleCreateFontIndirect
SysStringLen
VariantInit
LoadRegTypeLi
SysAllocStringLen
VariantCopy
VariantClear
SysAllocStringByteLen
LoadTypeLi
SysStringByteLen
SysAllocString
SysFreeString
VarUI4FromStr
wininet
InternetGetConnectedState
sensapi
IsNetworkAlive
psapi
GetModuleFileNameExW
shlwapi
SHDeleteValueW
StrChrIW
StrCmpW
PathAddBackslashW
PathRemoveFileSpecW
PathStripToRootW
StrStrIW
SHStrDupW
PathIsSameRootW
PathSkipRootW
PathAppendW
PathFileExistsW
PathIsDirectoryW
SHGetValueW
SHSetValueW
SHDeleteKeyW
comctl32
_TrackMouseEvent
InitCommonControlsEx
msimg32
TransparentBlt
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
winhttp
WinHttpOpen
WinHttpSetTimeouts
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpSetOption
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpConnect
WinHttpReadData
WinHttpGetProxyForUrl
WinHttpWriteData
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpGetIEProxyConfigForCurrentUser
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
winmm
timeSetEvent
timeKillEvent
iphlpapi
GetAdaptersInfo
gdiplus
GdipSetCompositingQuality
GdiplusStartup
GdiplusShutdown
GdipImageSelectActiveFrame
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipCreateFromHDC
GdipCreateBitmapFromStream
GdipGetImageHeight
GdipGetImageWidth
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipCloneImage
GdipDisposeImage
GdipDrawImageRectRect
GdipFillRectangle
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipSetSmoothingMode
GdipImageGetFrameDimensionsCount
GdipSetCompositingMode
GdipAlloc
GdipReleaseDC
GdipFree
GdipSetPixelOffsetMode
GdipSetInterpolationMode
GdipDeleteGraphics
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 225KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 61KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37.8MB - Virtual size: 37.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ