H:\rc_v10_i18n_201811_branch\Build\Release\WPSOffice\office6\ksolaunch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_cd2360e524f876e8faab1b4cf83e2bb8_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-11_cd2360e524f876e8faab1b4cf83e2bb8_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-11_cd2360e524f876e8faab1b4cf83e2bb8_mafia
-
Size
1.2MB
-
MD5
cd2360e524f876e8faab1b4cf83e2bb8
-
SHA1
2fdcd5c0efd851b80a39bd22d2c04c691c3bf98f
-
SHA256
10350b3b221b615698ce9154a179e658a4a0829c9f72127c6006c3b9a22d4fe9
-
SHA512
5c460bd8ebe330e827b8b16550b98ceffae5fc6df8386d3cfc650c3b3840accac004cbfad859533c25536b50ffdce276f49c77cb82f9c994344610218613e4cc
-
SSDEEP
24576:M9bGpjdiZlxbI/xdche0GH4xM9/034xM9A:MpGpj2Sxyhe0jxM/xM2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-11_cd2360e524f876e8faab1b4cf83e2bb8_mafia
Files
-
2024-06-11_cd2360e524f876e8faab1b4cf83e2bb8_mafia.exe windows:5 windows x86 arch:x86
bcb761f127943ed39ef6a812181aeb97
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
GetModuleFileNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleHandleW
GetProcAddress
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
LocalAlloc
LocalFree
CloseHandle
SetUnhandledExceptionFilter
SetFilePointerEx
GetFileSizeEx
WriteFile
FileTimeToSystemTime
SystemTimeToFileTime
GetSystemTime
CompareFileTime
CreateFileW
GetFileAttributesW
ReadFile
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
FindClose
FindFirstFileW
GetLastError
GetFileAttributesExW
CreateDirectoryW
WideCharToMultiByte
FindNextFileW
GetPrivateProfileIntW
GetVersionExW
FreeLibrary
LoadLibraryW
GetCurrentProcessId
Sleep
ExpandEnvironmentStringsW
GetCurrentThread
ProcessIdToSessionId
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapFree
HeapAlloc
LCMapStringW
GetCPInfo
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
GetLocaleInfoW
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
FlushFileBuffers
GetProcessHeap
OpenProcess
GetPrivateProfileStringW
TerminateProcess
user32
wsprintfW
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
advapi32
RevertToSelf
OpenThreadToken
EqualSid
IsValidSid
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RegOpenCurrentUser
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
shlwapi
PathFileExistsW
Sections
.text Size: 333KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 714KB - Virtual size: 714KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ