F:\jenkins\workspace\DrFone13\ModuleUpgrade\SharpUpgrade\Release\InstallAssistService.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-23_ff4bf5fe4bd8f3f70f72a212b4767d8c_mafia.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-23_ff4bf5fe4bd8f3f70f72a212b4767d8c_mafia.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-23_ff4bf5fe4bd8f3f70f72a212b4767d8c_mafia
-
Size
1.6MB
-
MD5
ff4bf5fe4bd8f3f70f72a212b4767d8c
-
SHA1
2077acd6b56646f392fadce24a3cb09b97521811
-
SHA256
4538dab5e5a2b3fa92337f01ff62729c987e92c8d22f0331ed523968358fa84c
-
SHA512
837106a646f66e853fcd7721d960b7937f7e660b166a03b8b6ac10bf77f1c335bbcb2b29e6ebd7f845c93829755ec7a3c65e32735f9f366858f691327effbbe3
-
SSDEEP
24576:f3R+DKhCO7sHvAivdBCCdQaqEe0GAlrBuXmU4:fZ7sPAivdBzdQ77mU4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-23_ff4bf5fe4bd8f3f70f72a212b4767d8c_mafia
Files
-
2024-07-23_ff4bf5fe4bd8f3f70f72a212b4767d8c_mafia.exe windows:5 windows x86 arch:x86
416333ed07e4ed6742e90b5c6a8f2c8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
Sleep
WTSGetActiveConsoleSessionId
OpenProcess
GetCurrentThread
GetCurrentProcess
CloseHandle
QueueUserWorkItem
CreateEventW
GetLastError
SetEvent
WaitForSingleObject
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetLocaleInfoW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetFileAttributesA
CreateDirectoryA
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
HeapCreate
ExitProcess
SetEnvironmentVariableA
advapi32
GetTokenInformation
ControlService
QueryServiceStatus
StartServiceW
ChangeServiceConfig2W
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
ReportEventW
RegisterServiceCtrlHandlerW
SetServiceStatus
DeregisterEventSource
StartServiceCtrlDispatcherW
RegisterEventSourceW
FreeSid
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
EqualSid
CreateProcessAsUserW
SetTokenInformation
DuplicateTokenEx
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
wtsapi32
WTSEnumerateSessionsW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
ws2_32
sendto
bind
socket
closesocket
setsockopt
getsockname
ntohs
WSAStartup
recvfrom
htons
htonl
inet_addr
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 242KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE