E:\CPlusProject\trunk\SetupNew\Release\SetupNew.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-10_508d78f588d0de03d7ff4d5b2ecc3ca9_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-10_508d78f588d0de03d7ff4d5b2ecc3ca9_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-10_508d78f588d0de03d7ff4d5b2ecc3ca9_mafia
-
Size
2.5MB
-
MD5
508d78f588d0de03d7ff4d5b2ecc3ca9
-
SHA1
c4d1777823584009e34970bb81506234f71d8abb
-
SHA256
4d9943df586bc55bc438e9dca361e4b216f3a28df0576aca1434c50a786a537e
-
SHA512
d9e24a27232bab729aff50c18738ddf9a7c3982c037f235aeec728dde121277b9760b3313825ee439ee66a5b780a52fcae03c7e7ef4ff29df8f6ef59410953b6
-
SSDEEP
49152:dECfGbU/eztTUwWYyDW++2/4rTsZJmjSxG3SwNLrbLk42OmK16fQyjo:dECfGbU/ez5U9YaWu/4CtxG3Prnk4OK7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-10_508d78f588d0de03d7ff4d5b2ecc3ca9_mafia
Files
-
2024-08-10_508d78f588d0de03d7ff4d5b2ecc3ca9_mafia.exe windows:5 windows x86 arch:x86
b0fdb5a655ace54894c1db8487f25692
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentDirectoryW
GetFileType
DuplicateHandle
GetTempFileNameA
GetCommandLineW
GetModuleFileNameW
SetCurrentDirectoryW
GetFileAttributesW
HeapDestroy
FlushInstructionCache
HeapCreate
LockResource
LoadResource
SizeofResource
FindResourceW
FreeResource
GetFullPathNameW
GetModuleHandleA
MulDiv
LoadLibraryW
GetVersionExA
GetTickCount
DosDateTimeToFileTime
VirtualProtect
LoadLibraryA
GetThreadLocale
SetLastError
lstrlenW
IsBadReadPtr
GetProcessHeap
HeapFree
HeapAlloc
FreeLibrary
WinExec
GetDiskFreeSpaceExA
MoveFileA
WritePrivateProfileStringA
SetCurrentDirectoryA
ExitProcess
GetTempPathA
GetCurrentProcessId
CreateToolhelp32Snapshot
FindNextFileW
FindNextFileA
Process32NextW
Process32FirstW
GetLocalTime
FindClose
RemoveDirectoryA
GetProcAddress
FindFirstFileA
InterlockedCompareExchange
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
SetEnvironmentVariableA
SetFileTime
SetEndOfFile
GetDriveTypeW
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
InterlockedExchange
SetConsoleCtrlHandler
GetTimeZoneInformation
FlushFileBuffers
FatalAppExitA
SetHandleCount
GetConsoleMode
GetConsoleCP
GetStringTypeW
InitializeCriticalSectionAndSpinCount
HeapSize
LCMapStringW
RaiseException
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
GetStartupInfoW
HeapSetInformation
ResumeThread
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileAttributesA
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
CreateThread
GetCurrentThreadId
ExitThread
CreateDirectoryW
GetCurrentProcess
CompareStringW
TerminateProcess
OpenProcess
FindFirstFileW
DeleteFileA
SetFileAttributesW
GetModuleFileNameA
CreateFileMappingW
GetModuleHandleW
MapViewOfFile
MultiByteToWideChar
FormatMessageW
WideCharToMultiByte
DeleteFileW
GetTempPathW
Sleep
CreateProcessW
lstrcmpW
InterlockedDecrement
InterlockedIncrement
CreateEventW
CreateSemaphoreW
ResetEvent
ReleaseSemaphore
InitializeCriticalSection
SetEvent
CreateFileA
WaitForSingleObject
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersionExW
VirtualAlloc
VirtualFree
CloseHandle
GetLastError
CreateFileW
ReadFile
WriteFile
SetFilePointer
GetFileSize
SystemTimeToFileTime
lstrlenA
user32
IsWindowVisible
GetActiveWindow
wsprintfW
SendMessageW
ShowWindow
PostMessageW
GetWindow
GetMonitorInfoW
MapWindowPoints
GetParent
SetWindowPos
MonitorFromWindow
GetWindowLongW
GetClientRect
GetWindowRect
DestroyWindow
DestroyCursor
GetDesktopWindow
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
PtInRect
IsRectEmpty
IsWindow
DefWindowProcW
SetFocus
InvertRect
FillRect
MessageBoxW
GetFocus
DrawIconEx
CopyRect
IsWindowEnabled
SetActiveWindow
IsMenu
SetRect
EqualRect
InflateRect
IntersectRect
UnionRect
SetCursor
SetTimer
KillTimer
UpdateWindow
SetWindowLongW
InvalidateRect
ScreenToClient
GetDC
ReleaseDC
SetCapture
SetWindowTextW
IsIconic
DestroyIcon
GetCursorPos
ReleaseCapture
GetCapture
HideCaret
CreateCaret
GetCaretBlinkTime
SetCaretPos
IsZoomed
AnimateWindow
EnableWindow
UpdateLayeredWindow
LoadCursorW
AppendMenuW
CreatePopupMenu
GetSubMenu
DestroyMenu
SetForegroundWindow
TrackPopupMenu
InsertMenuW
GetMenuItemCount
GetMenuItemInfoW
MapVirtualKeyA
CharLowerBuffW
DrawTextW
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
LoadIconW
EnableMenuItem
GetKeyState
GetSysColor
ClientToScreen
CreateIconFromResource
LoadImageW
LoadBitmapW
CharNextW
OffsetRect
GetIconInfo
RegisterClassExW
CreateWindowExW
CallWindowProcW
GetDlgItem
UnregisterClassW
SetLayeredWindowAttributes
BeginPaint
EndPaint
PostQuitMessage
GetClassNameW
TrackMouseEvent
gdi32
CreateCompatibleDC
CreateRoundRectRgn
DeleteDC
CreateSolidBrush
SelectObject
Rectangle
SetBkMode
CreateFontIndirectW
GetClipBox
GetDCOrgEx
GetDeviceCaps
SetGraphicsMode
EnumFontsW
GetStockObject
GetObjectW
DeleteObject
BitBlt
CreateBitmap
SetViewportOrgEx
CreateCompatibleBitmap
StretchBlt
CreateDIBSection
CombineRgn
PtInRegion
RectInRegion
GetRgnBox
OffsetRgn
SetRectRgn
SetTextColor
GetTextColor
ExtSelectClipRgn
SaveDC
CreateRectRgnIndirect
RestoreDC
ExcludeClipRect
IntersectClipRect
CreateRectRgn
GetTextExtentPoint32W
RoundRect
Ellipse
SetWorldTransform
GetWorldTransform
Polyline
Arc
Chord
CreatePen
CreatePatternBrush
GetClipRgn
GetViewportOrgEx
GetCurrentObject
advapi32
RegDeleteKeyA
RegQueryInfoKeyW
RegQueryValueExA
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegSaveKeyW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
RegRestoreKeyW
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegEnumKeyA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetPathFromIDListW
ShellExecuteA
ShellExecuteW
CommandLineToArgvW
SHBrowseForFolderW
ole32
CreateBindCtx
OleLockRunning
CLSIDFromString
CreateStreamOnHGlobal
OleUninitialize
OleInitialize
CoInitialize
CoUninitialize
CoCreateInstance
CLSIDFromProgID
oleaut32
SysAllocStringLen
SysFreeString
SysStringByteLen
SysStringLen
SysAllocStringByteLen
CreateErrorInfo
SetErrorInfo
VariantInit
VariantClear
VariantChangeType
GetErrorInfo
SysAllocString
shlwapi
PathFileExistsA
StrToIntExW
netapi32
Netbios
wininet
HttpQueryInfoA
InternetConnectA
InternetCrackUrlA
InternetReadFile
InternetSetOptionA
HttpQueryInfoW
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
InternetReadFileExA
DeleteUrlCacheEntryW
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
FindCloseUrlCache
ws2_32
send
gethostbyname
closesocket
socket
recv
WSACleanup
setsockopt
htons
WSAStartup
connect
psapi
GetProcessImageFileNameA
imagehlp
MakeSureDirectoryPathExists
imm32
ImmReleaseContext
ImmGetContext
gdiplus
GdipGetImageEncodersSize
GdiplusStartup
GdipFree
GdipAlloc
GdipDeleteGraphics
GdipDisposeImage
GdipSaveImageToFile
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipGetImageEncoders
GdipGetImageGraphicsContext
GdipGraphicsClear
GdipDrawImageRectI
GdiplusShutdown
GdipCloneImage
msimg32
GradientFill
AlphaBlend
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 310KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ