c:\bld_area\SEP_12.1\Output\SEPClientProtection\Bin.iru\AutoExcl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-09_cc1740efb7762be59321769faf031df6_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-09_cc1740efb7762be59321769faf031df6_mafia.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-09_cc1740efb7762be59321769faf031df6_mafia
-
Size
1.3MB
-
MD5
cc1740efb7762be59321769faf031df6
-
SHA1
b9ea6a60a515e70ca09244236cd553ded922db9b
-
SHA256
638cd9326202dbafc13ce648df22ceee11030ea0e21b77629f26139129d93109
-
SHA512
1469718edc0e28de7b8c95f093879a148d628fbdaf3f476f598c9c743cee7419b21ea6f4558046b6a659ec8ad99c1c2be6af578ace711905ca2a9551b1f48a3f
-
SSDEEP
24576:uQf7P8SpdIVM9nvyD2pXRKxcIeQgdf3ZgoikYgO2XXd/idx8KD62Tp14:jPuM9vhRKxm3Z3L3O2XX05D62
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-09_cc1740efb7762be59321769faf031df6_mafia
Files
-
2024-07-09_cc1740efb7762be59321769faf031df6_mafia.exe windows:5 windows x86 arch:x86
77f1dc0a0f61975e6c644b0f7b08f397
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathAddBackslashW
SHDeleteKeyW
SHDeleteEmptyKeyW
PathAppendW
PathIsUNCW
PathSkipRootW
PathCanonicalizeW
PathIsUNCServerW
PathRemoveFileSpecW
psapi
GetProcessImageFileNameW
kernel32
FreeLibrary
VirtualQuery
MultiByteToWideChar
LoadLibraryExW
lstrlenA
ReadProcessMemory
GetLongPathNameW
QueryDosDeviceW
lstrlenW
GetFileAttributesW
SetLastError
CloseHandle
GetModuleHandleW
CreateFileW
lstrcmpA
lstrcmpW
DuplicateHandle
LoadLibraryW
WideCharToMultiByte
GetProcessTimes
GetWindowsDirectoryW
GetSystemDirectoryW
GetCurrentDirectoryW
GetShortPathNameW
VerifyVersionInfoW
VerSetConditionMask
GetCurrentThread
GetSystemInfo
GetVersionExW
DeleteCriticalSection
EnterCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
VirtualFree
HeapSize
VirtualAlloc
SetFilePointer
GetProcAddress
WriteFile
FlushFileBuffers
GetFileSize
SetEndOfFile
DeleteFileW
CreateDirectoryW
lstrcpyW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
ReleaseSemaphore
CreateSemaphoreW
OpenSemaphoreW
SetEvent
PulseEvent
ResetEvent
CreateEventW
OpenEventW
WaitForMultipleObjects
WaitForMultipleObjectsEx
WaitForSingleObject
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
OpenProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
GetProcessId
GetLastError
GetModuleFileNameW
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
InterlockedDecrement
ExpandEnvironmentStringsW
FindResourceExW
FindResourceW
SizeofResource
LockResource
LoadResource
Sleep
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
GetProcessHeap
HeapReAlloc
HeapFree
HeapAlloc
GetStringTypeExW
ReadFile
IsProcessorFeaturePresent
HeapDestroy
HeapCreate
GetStartupInfoW
GetStdHandle
SetHandleCount
GetFileType
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
GetCPInfo
VirtualProtect
RtlUnwind
HeapSetInformation
GetCommandLineW
MoveFileW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
GetStringTypeW
InterlockedCompareExchange
InterlockedIncrement
RaiseException
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
user32
MsgWaitForMultipleObjectsEx
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageA
IsWindowUnicode
GetMessageA
DispatchMessageW
GetSystemMetrics
wsprintfW
CharNextW
CharPrevW
LoadStringW
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
AllocateAndInitializeSid
OpenThreadToken
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegEnumKeyExW
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegQueryInfoKeyW
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyW
RegEnumValueW
RegSetValueExW
RegDeleteValueW
RegCloseKey
RegQueryValueExW
TraceMessage
ole32
StringFromGUID2
OleLoadFromStream
CoTaskMemFree
IIDFromString
StringFromIID
GetHGlobalFromStream
OleSaveToStream
CLSIDFromString
CreateStreamOnHGlobal
oleaut32
SafeArrayAccessData
SysAllocStringByteLen
SafeArrayCreate
SafeArrayLock
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetElement
SafeArrayUnlock
SafeArrayRedim
SafeArrayCreateVector
VariantClear
SafeArrayUnaccessData
VariantInit
VariantCopyInd
SysStringByteLen
Sections
.text Size: 627KB - Virtual size: 626KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 620KB - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE