D:\qb_installer\workspace\ubit\Installers\GFX_Installer\PrInstaller\ASE_Installers\HDMI\Release\GFX.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_004acd6687b79a928679fa41ac3bc409_mafia.exe
Resource
win7-20240705-en
General
-
Target
2024-07-10_004acd6687b79a928679fa41ac3bc409_mafia
-
Size
1.5MB
-
MD5
004acd6687b79a928679fa41ac3bc409
-
SHA1
651cd51cfc0c75b6f921b6421e8dffcd06703b66
-
SHA256
916e9923cffb7b2c1915728397f3530ba0cbb20d7339535c554bfc60a06c689e
-
SHA512
4f3f1dd23607b0a6b6e54c32c59ee89ae3dd5441850ab37df53a40f63d50747962fca740000876107368edc64b9dd0e3bd08c7e3eeeb40813d0f1a3f2df37d29
-
SSDEEP
24576:n4G8wqGFQ2+d5U9et2iJ9A99Jv71YZsqjnhMgeiCl7G0nehbGZpbD:nlFW2E5UY2eejJqdDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-10_004acd6687b79a928679fa41ac3bc409_mafia
Files
-
2024-07-10_004acd6687b79a928679fa41ac3bc409_mafia.exe windows:5 windows x86 arch:x86
c469ce5d0f87f04cab609912ad9631b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSize
ReadFile
MultiByteToWideChar
GetFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
LoadLibraryW
CreateMutexW
CreateThread
GetPrivateProfileStringW
GetLocalTime
GetCommandLineW
GetTickCount
SetFilePointer
WriteFile
EnumResourceLanguagesW
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersion
ConvertDefaultLocale
GetLocaleInfoW
GetVersionExW
GetCurrentProcess
GetSystemInfo
GetSystemWow64DirectoryW
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
GetExitCodeProcess
CreateEventW
SetEvent
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
ExitProcess
LocalAlloc
CreateFileW
GetProcessHeap
SetEndOfFile
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
SetErrorMode
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsProcessorFeaturePresent
WriteConsoleW
SetStdHandle
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetCurrentThreadId
GetFileType
HeapCreate
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
RaiseException
GetStartupInfoW
HeapSetInformation
GetCPInfo
GetCurrentDirectoryW
RemoveDirectoryW
MoveFileW
CompareFileTime
CopyFileW
GetTempFileNameW
GetTempPathW
GetEnvironmentVariableW
GetSystemDirectoryW
GetFileAttributesW
FreeLibrary
GetProcAddress
LoadLibraryExW
Sleep
SetFileAttributesW
MoveFileExW
DeleteFileW
WaitForSingleObject
CreateProcessW
SetLastError
VerifyVersionInfoW
VerSetConditionMask
GetWindowsDirectoryW
TlsAlloc
FindNextFileW
FindClose
FindFirstFileW
LocalFree
GetModuleFileNameW
GetLastError
SizeofResource
LockResource
LoadResource
FindResourceW
GetModuleHandleW
TlsSetValue
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
TlsGetValue
GetConsoleMode
GetConsoleCP
HeapFree
HeapAlloc
DecodePointer
EncodePointer
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
CloseHandle
CreateFileA
TlsFree
GetLocaleInfoA
LoadLibraryA
user32
ShowWindow
SendMessageW
GetDlgItem
wsprintfW
EndDialog
SetDlgItemTextW
DialogBoxIndirectParamW
MonitorFromWindow
GetMonitorInfoW
OffsetRect
GetWindowLongW
AdjustWindowRect
GetWindowRect
DrawTextW
LoadIconW
GetSystemMetrics
SetRectEmpty
PostMessageW
EnableWindow
SetFocus
FillRect
SetWindowPos
SetWindowTextW
GetClientRect
ReleaseDC
GetWindowTextW
GetWindowTextLengthW
GetDC
MessageBoxIndirectW
LoadImageW
SendMessageTimeoutW
ExitWindowsEx
EnumWindows
GetWindowThreadProcessId
GetWindowModuleFileNameW
LoadStringW
DialogBoxParamW
MessageBoxW
KillTimer
SendDlgItemMessageW
SetTimer
gdi32
SetBkMode
SetTextColor
GetStockObject
DeleteDC
StretchBlt
BitBlt
CreateCompatibleDC
GetObjectW
GetTextExtentPoint32W
SelectObject
DeleteObject
CreateFontW
GetDeviceCaps
advapi32
RegQueryInfoKeyW
RegQueryValueExW
RegCloseKey
RegEnumValueW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegCreateKeyExW
RegSetValueExW
IsTextUnicode
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
DeleteService
ControlService
QueryServiceConfigW
StartServiceW
CloseServiceHandle
ChangeServiceConfigW
ChangeServiceConfig2W
CreateServiceW
OpenServiceW
OpenSCManagerW
QueryServiceStatus
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
shell32
SHGetFolderPathW
SHCreateDirectoryExW
CommandLineToArgvW
SHCreateDirectoryExA
SHGetKnownFolderPath
ShellExecuteW
ole32
CoInitialize
CoTaskMemFree
CLSIDFromString
CoInitializeEx
CoUninitialize
CoCreateInstance
PropVariantClear
oleaut32
VariantClear
SysFreeString
SysAllocString
cabinet
ord21
ord20
ord22
ord23
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiSetClassInstallParamsW
SetupDiCallClassInstaller
SetupDiGetDeviceInstallParamsW
SetupDiDestroyDeviceInfoList
SetupOpenInfFileW
SetupCloseInfFile
SetupFindFirstLineW
SetupGetLineTextW
SetupGetStringFieldW
SetupDiEnumDeviceInfo
SetupDiGetINFClassW
SetupFindNextLine
SetupDiGetClassDevsW
shlwapi
PathMatchSpecA
PathIsDirectoryEmptyW
PathRemoveBackslashW
PathIsSystemFolderW
PathIsRootW
ord176
PathRenameExtensionW
PathFindFileNameW
PathRemoveFileSpecA
PathAddBackslashA
PathFindFileNameA
PathStripToRootW
PathIsDirectoryW
PathAddBackslashW
SHStrDupW
PathAppendA
PathRemoveFileSpecW
PathFileExistsW
SHDeleteKeyW
PathStripPathW
PathCombineW
PathFindExtensionW
PathAppendW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
psapi
EnumProcessModules
GetModuleFileNameExW
Sections
.text Size: 328KB - Virtual size: 328KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 524KB - Virtual size: 524KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE