C:\Users\eyalfishler\AppData\Roaming\ShieldSoft\UI\bin\shieldui.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_27ed3f1df7f2d766af67c912325d3d79_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-07-04_27ed3f1df7f2d766af67c912325d3d79_mafia.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-07-04_27ed3f1df7f2d766af67c912325d3d79_mafia
-
Size
416KB
-
MD5
27ed3f1df7f2d766af67c912325d3d79
-
SHA1
afa82b7fd4f0098d24551b2cbfd4d25895fb032f
-
SHA256
add8e3714f45af680e261710ce3c33a22bd17338e3bc5b3906435e805274c333
-
SHA512
04e1bf816419f8ca9329aee5673eb6e16e8a02e8ec7f540c54e3eec18042a43abb4fa1521fe66666d19de5cb43e151bfaae44d2e712d5483a88acdf870b9d8a6
-
SSDEEP
12288:zxqt5Yorvjul6+hsJJNhHfJQ/uM6jReMD:Vqt5ljizhsJHBJmuMQR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-04_27ed3f1df7f2d766af67c912325d3d79_mafia
Files
-
2024-07-04_27ed3f1df7f2d766af67c912325d3d79_mafia.exe windows:5 windows x86 arch:x86
0ee8f761a01d3d1372b7a32e5961d5d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FormatMessageA
WriteFile
FatalAppExitW
Sleep
SizeofResource
GetMailslotInfo
ReadFile
CreateFileW
CreateMailslotW
GetProcAddress
GlobalFree
lstrcmpiW
CloseHandle
SetEndOfFile
CreateFileA
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
SetStdHandle
LoadLibraryW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
FlushFileBuffers
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
SetFilePointer
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
GetStdHandle
ExitProcess
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualProtect
HeapSize
HeapReAlloc
HeapDestroy
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LoadLibraryExW
LoadResource
FreeLibrary
FindResourceW
GetCurrentThreadId
DeleteCriticalSection
EnterCriticalSection
SetLastError
GetCurrentDirectoryW
lstrlenA
GetLastError
RaiseException
FlushInstructionCache
GlobalUnlock
lstrlenW
MultiByteToWideChar
lstrcmpW
GetModuleFileNameW
MulDiv
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
GlobalAlloc
GlobalLock
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
InterlockedExchange
DecodePointer
EncodePointer
user32
ReleaseCapture
SendMessageW
IsWindow
SetWindowTextW
CallWindowProcW
DefWindowProcW
EnableWindow
CreateWindowExW
ShowWindow
GetWindow
MoveWindow
DispatchMessageW
GetWindowRect
PostQuitMessage
TrackPopupMenu
RegisterWindowMessageA
LoadIconW
AppendMenuW
PeekMessageW
CreatePopupMenu
IsWindowVisible
EndPaint
ClientToScreen
DestroyWindow
GetWindowTextLengthW
DestroyAcceleratorTable
ScreenToClient
UnregisterClassA
GetMessageW
CharNextW
RegisterWindowMessageW
FillRect
IsChild
SetCapture
PostMessageW
SetForegroundWindow
GetFocus
GetParent
InvalidateRgn
LoadCursorW
IsWindowEnabled
GetClientRect
CreateAcceleratorTableW
SetFocus
BeginPaint
GetClassInfoExW
GetDC
TranslateMessage
RegisterClassExW
InvalidateRect
GetWindowLongW
GetWindowTextW
GetClassNameW
ReleaseDC
GetDlgItem
SetWindowLongW
RedrawWindow
GetDesktopWindow
GetSysColor
SetWindowPos
GetCursorPos
SetLayeredWindowAttributes
gdi32
BitBlt
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
GetStockObject
CreateSolidBrush
DeleteDC
advapi32
RegSetValueExW
RegCloseKey
RegEnumKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetUserNameA
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegOpenKeyW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExA
RegCreateKeyW
shell32
ShellExecuteW
Shell_NotifyIconW
SHGetFolderPathW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoGetClassObject
OleUninitialize
OleInitialize
StringFromGUID2
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CoCreateInstance
oleaut32
VariantClear
SysAllocString
LoadTypeLi
VariantInit
VarUI4FromStr
LoadRegTypeLi
SysFreeString
OleCreateFontIndirect
SysAllocStringLen
VarBstrCat
SysStringLen
shlwapi
PathRemoveFileSpecW
Sections
.text Size: 242KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ