C:\Users\Administrator\Desktop\supreme\Supreme\Release\Supreme.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-17_d5024dff57c19ba51650d6f8fdd46e3d_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-17_d5024dff57c19ba51650d6f8fdd46e3d_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-17_d5024dff57c19ba51650d6f8fdd46e3d_mafia
-
Size
213KB
-
MD5
d5024dff57c19ba51650d6f8fdd46e3d
-
SHA1
c8fd4246fd79c7d86a2349cf3463d93cae86da1c
-
SHA256
22bee948262e6589a6c00d65d755ba556d75eee8217ad5641a1f158d7b93fb9e
-
SHA512
471e65dda1e5d8f41086dbaeaa9b6e9e3611092dd27fa7df8e69ecdb377013804d65523b4c4581f4842e5c4aad6965526aac78cdb44252320b90afbf09f68838
-
SSDEEP
3072:Xp1GhaZRT88B2xffgdPOTV25k8KVyKUHszKhD0Iouvm9X66P3X+2:52kmo9P5ktyKUHJhD0IMPfJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-17_d5024dff57c19ba51650d6f8fdd46e3d_mafia
Files
-
2024-08-17_d5024dff57c19ba51650d6f8fdd46e3d_mafia.exe windows:5 windows x86 arch:x86
3888d8af817073a2d28a3b8a338ef5bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadProcessMemory
CreateProcessA
ReadFile
VirtualAlloc
VirtualAllocEx
WriteProcessMemory
ResumeThread
ExitProcess
lstrlenA
HeapAlloc
GetProcessHeap
GlobalAlloc
CreateDirectoryA
CopyFileA
SetFileAttributesA
LocalAlloc
GetModuleFileNameA
CreateMutexA
GetCurrentProcessId
GetComputerNameA
GetUserDefaultLocaleName
GlobalMemoryStatus
GetCurrentProcess
TzSpecificLocalTimeToSystemTime
SetFilePointer
GetProcAddress
IsWow64Process
GetSystemInfo
GetModuleHandleA
GetSystemTime
GetTickCount
OpenProcess
Thread32First
WideCharToMultiByte
TerminateProcess
Thread32Next
Process32FirstW
OpenThread
Process32NextW
CreateToolhelp32Snapshot
SuspendThread
CompareStringW
SetEndOfFile
WriteConsoleW
SetStdHandle
LoadLibraryW
SetThreadContext
CreateFileA
GetThreadContext
CloseHandle
GetLastError
MultiByteToWideChar
CreateFileW
WriteFile
CreateThread
GetTimeZoneInformation
Sleep
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
GetStringTypeW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetModuleFileNameW
HeapCreate
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
GetCurrentThreadId
SetLastError
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
GetModuleHandleW
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
EnumDisplayDevicesW
GetWindowTextA
CharToOemW
GetForegroundWindow
ReleaseDC
MessageBoxA
gdi32
CreateDCW
GetDeviceCaps
advapi32
RegCloseKey
GetUserNameA
RegOpenKeyExW
RegQueryValueExW
GetCurrentHwProfileA
shell32
ShellExecuteW
ShellExecuteExA
ShellExecuteA
psapi
GetModuleBaseNameW
EnumProcessModules
GetModuleFileNameExW
winhttp
WinHttpSendRequest
WinHttpCloseHandle
WinHttpOpen
WinHttpOpenRequest
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpReceiveResponse
ws2_32
send
gethostbyname
closesocket
socket
htons
WSAStartup
connect
urlmon
URLOpenBlockingStreamA
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ