D:\work\stcode\newDesktopIcon\bin\icon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_1b9ffc47f4c47ef81f6f950037b87709_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-14_1b9ffc47f4c47ef81f6f950037b87709_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-14_1b9ffc47f4c47ef81f6f950037b87709_mafia
-
Size
2.2MB
-
MD5
1b9ffc47f4c47ef81f6f950037b87709
-
SHA1
786a81649c47eed0bbf6feaf163a3624b133a30b
-
SHA256
53483cf1fe0f6392478c8e46743b4ca055192fa1c08e65e9602179e116c70bd2
-
SHA512
96f7f07c6d4504d7e24bed6d0665039bc6f875345bb64c190adbac2c8ccc63af60a1421c3e66c15b7af91d0fc8be72847146391c121f5999a32c0ba0ea45942b
-
SSDEEP
49152:uN9+TGyw1Qi4V4lDnBORn2+ZF5H+ZIT2DstgTFZpA1G6MtS0rQMYOQ+q8CQUyO:uN9vQiAxT2DZoGjM0r1Qn
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-14_1b9ffc47f4c47ef81f6f950037b87709_mafia
Files
-
2024-06-14_1b9ffc47f4c47ef81f6f950037b87709_mafia.exe windows:6 windows x86 arch:x86
7ce7c6f0d829a707c2f8771fa62a0a98
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSectionEx
FindClose
RaiseException
LoadLibraryW
DecodePointer
GetProcAddress
DeleteCriticalSection
WideCharToMultiByte
SizeofResource
GetCurrentProcess
FindResourceA
GetModuleHandleA
LoadLibraryA
LockResource
LoadResource
GetModuleFileNameW
FreeLibrary
ExitProcess
HeapReAlloc
HeapAlloc
GetModuleHandleExW
GetStdHandle
FindNextFileW
GetCommandLineW
GetCommandLineA
CloseHandle
CreateFileA
GetLastError
Sleep
MultiByteToWideChar
CreateFileW
RtlUnwind
LoadLibraryExW
OutputDebugStringW
GetComputerNameW
WriteConsoleW
GetProcessHeap
FileTimeToSystemTime
FileTimeToLocalFileTime
GetProcessTimes
OpenProcess
Process32NextW
lstrcmpiW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
HeapSize
CreateDirectoryW
Process32FirstW
CreateToolhelp32Snapshot
GlobalFree
GlobalAlloc
GetFileAttributesExW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
WriteFile
FindFirstFileExW
ReadFile
GetFileSizeEx
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
EncodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
CompareStringW
HeapFree
user32
LoadStringA
MessageBoxA
advapi32
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
rpcrt4
UuidCreateSequential
wininet
InternetCheckConnectionW
HttpQueryInfoW
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
iphlpapi
GetAdaptersInfo
SendARP
ws2_32
socket
htons
connect
inet_addr
closesocket
getsockname
gethostbyname
Sections
.text Size: 181KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ