z:\gr\chromiumtrunk\27.0.1453.93\src\build\Release\delegate_execute.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-11_80938fa5aa8bac5f81e6392352c4f148_mafia.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-11_80938fa5aa8bac5f81e6392352c4f148_mafia.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-11_80938fa5aa8bac5f81e6392352c4f148_mafia
-
Size
386KB
-
MD5
80938fa5aa8bac5f81e6392352c4f148
-
SHA1
95161f8464d05ad781b8e78fc0c3e18144ec1af7
-
SHA256
4aa060baa2feaf7cf0c61883103dddaeba6a74698e27f26877f86949052f268a
-
SHA512
77e243f6feef3dfd9d58b54c6216a0b2c101f6919217872a7767ca31494e13961a81370ab8d970b2b4a46fd1a2725924088c2e93749ff8636d049572f5c60e0d
-
SSDEEP
12288:uDU4/m2tESyR7bFTRW0BFxAIRWSIZkfPsIUeY+:e+ZRW0BFxeSX3sZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-11_80938fa5aa8bac5f81e6392352c4f148_mafia
Files
-
2024-07-11_80938fa5aa8bac5f81e6392352c4f148_mafia.exe windows:5 windows x86 arch:x86
2d7a5c5ad5516fe20304f18bb848f1d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCrackUrlW
kernel32
GetTempPathW
WaitForSingleObject
Sleep
GetCurrentThreadId
CreateThread
OpenProcess
SetEvent
GetCommandLineW
OpenMutexW
CreateProcessW
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
InterlockedDecrement
LockResource
InterlockedIncrement
CloseHandle
lstrcmpiW
GetModuleHandleW
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
SetEnvironmentVariableW
CreateEventW
SetEnvironmentVariableA
GetDriveTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
WriteConsoleW
GetTimeZoneInformation
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
GetLocaleInfoW
IsProcessorFeaturePresent
HeapCreate
GetCPInfo
LCMapStringW
RtlUnwind
GetFileType
SetStdHandle
GetProcessHeap
HeapReAlloc
ExitProcess
GetFullPathNameW
GetConsoleMode
GetConsoleCP
GetStartupInfoW
UnhandledExceptionFilter
HeapFree
HeapAlloc
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
GetCurrentProcess
GetCurrentProcessId
GetTickCount
ReleaseMutex
SetLastError
CreateMutexW
SetFilePointer
CreateFileW
WriteFile
OutputDebugStringA
FormatMessageA
GetModuleHandleA
GetFileAttributesW
CreateDirectoryW
GetCurrentDirectoryW
ReadFile
VirtualQueryEx
HeapSetInformation
GetProcessId
TerminateProcess
GetStdHandle
GetUserDefaultUILanguage
GetSystemTimeAsFileTime
ExpandEnvironmentStringsW
GetEnvironmentVariableW
GetUserDefaultLangID
InterlockedCompareExchange
IsDebuggerPresent
QueryPerformanceCounter
GetNativeSystemInfo
GetVersionExW
GetSystemDirectoryW
GetWindowsDirectoryW
InterlockedExchangeAdd
SetUnhandledExceptionFilter
SetEndOfFile
FlushFileBuffers
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
RtlCaptureContext
LoadLibraryW
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GlobalLock
GlobalUnlock
GetPrivateProfileStringW
WideCharToMultiByte
EncodePointer
DecodePointer
GetVersionExA
CompareStringW
advapi32
GetSidSubAuthorityCount
GetTokenInformation
OpenProcessToken
RegQueryValueExW
ConvertSidToStringSidW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
GetSidSubAuthority
ole32
CoRevokeClassObject
CoRegisterClassObject
CoInitializeEx
CoUninitialize
CoTaskMemRealloc
CoAddRefServerProcess
CoReleaseServerProcess
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
StringFromGUID2
ReleaseStgMedium
CoResumeClassObjects
oleaut32
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
VarUI4FromStr
SysFreeString
RegisterTypeLi
user32
PostThreadMessageW
GetMessageW
DispatchMessageW
TranslateMessage
CharUpperW
GetAsyncKeyState
FindWindowExW
GetWindowThreadProcessId
IsImmersiveProcess
AllowSetForegroundWindow
CharNextW
UnregisterClassA
RegisterClipboardFormatW
MessageBoxW
GetSystemMetrics
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
winmm
timeGetTime
shlwapi
UrlCreateFromPathA
PathFileExistsA
PathRemoveExtensionW
PathFindFileNameW
PathIsUNCA
PathFindExtensionW
UrlCreateFromPathW
PathIsUNCW
PathFileExistsW
Sections
.text Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ