C:\workcopy\Impersonate\Release\CrashReport.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_b68c469b51e1c2d080c71e18042618b1_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-24_b68c469b51e1c2d080c71e18042618b1_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-24_b68c469b51e1c2d080c71e18042618b1_mafia
-
Size
181KB
-
MD5
b68c469b51e1c2d080c71e18042618b1
-
SHA1
e809ab4f93955d1942558ab616f7d31402af0c99
-
SHA256
74f7eb81467f1b2f5fe86ab6eadb5e9fb09da074aeece8110d1e5779577a6460
-
SHA512
70f52294e78aa572f7ad65d9902a45733f807a782a891ca31cfb210cae0f55fb1abeb85bfba1bd5328f7b89558fb63683de14aaef177845cf3e6e54d7e096639
-
SSDEEP
3072:fb7TPN8IdJ8v0SCGHQ1MHLwOqr99+HBIJ3CqqQlbkX8iStpaysv:z3PN8IdJ8Xlwyc1rGHBIgEgsZI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-24_b68c469b51e1c2d080c71e18042618b1_mafia
Files
-
2024-08-24_b68c469b51e1c2d080c71e18042618b1_mafia.exe windows:5 windows x86 arch:x86
021560cb2484862e2ae734d9584d842b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
WideCharToMultiByte
CompareStringW
WriteConsoleW
GetTimeZoneInformation
GetProcessHeap
SetEndOfFile
SetStdHandle
LoadLibraryW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
GetProcAddress
GetModuleHandleW
ExitProcess
GetFullPathNameW
CloseHandle
GetFileInformationByHandle
PeekNamedPipe
GetFileType
CreateFileW
GetCurrentDirectoryW
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetStringTypeW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointer
ReadFile
FlushFileBuffers
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
SetEnvironmentVariableA
shell32
CommandLineToArgvW
shlwapi
PathFileExistsW
wininet
HttpAddRequestHeadersW
HttpOpenRequestW
HttpSendRequestW
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
InternetQueryDataAvailable
HttpQueryInfoW
InternetReadFile
InternetConnectW
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ