D:\codes\VS2010\SogouDownLoad-trunk\Src\MiniDownLoad\Release\MiniDownLoad.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-25_427c5db439046e3f29b13b23d9bc525c_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-25_427c5db439046e3f29b13b23d9bc525c_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-25_427c5db439046e3f29b13b23d9bc525c_mafia
-
Size
767KB
-
MD5
427c5db439046e3f29b13b23d9bc525c
-
SHA1
3478b85db1cdb345d150ecf35c7fb7a34d8ddb50
-
SHA256
95849ef70dd9d59de473ffea24313b647e329f83142bc37e865f7d85962c682d
-
SHA512
5398b72023c5445aa583ee8f5bdf85882a5e8d59bf09603360c817e09ffefaa5643d1b7c0da825a87558e80e482f4d2e0781fb61e135d0228b8bbcb24938d073
-
SSDEEP
12288:szGX66Rsx2Fcs1OltnllFCI9jiPwKEMx6mg1xGkg1aFSkYu8DU0OYhLu0O49g5+:0Gq6a2FcsEllTmwK14V1kkui6uKVOP+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-25_427c5db439046e3f29b13b23d9bc525c_mafia -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_2
Files
-
2024-08-25_427c5db439046e3f29b13b23d9bc525c_mafia.exe windows:5 windows x86 arch:x86
3fb23432188c79a31e42dcdd9267da5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
GetTempPathW
CompareStringW
GetTimeZoneInformation
GetProcessHeap
SetEndOfFile
CloseHandle
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameW
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateThread
ExitThread
lstrlenW
CreateFileW
SizeofResource
WriteFile
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
LoadResource
FindResourceW
GetCurrentDirectoryW
GetEnvironmentVariableW
CreateFileA
lstrcmpW
GetPrivateProfileStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapSetInformation
GetStartupInfoW
HeapFree
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
HeapReAlloc
HeapSize
Sleep
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateDirectoryW
CreateProcessW
WaitForSingleObject
DebugBreak
OutputDebugStringW
lstrlenA
CreateEventW
InitializeCriticalSection
CreateSemaphoreW
ResetEvent
ReleaseSemaphore
SetEvent
WaitForMultipleObjects
GetVersionExW
lstrcpynW
lstrcpyW
CreateMutexW
OpenMutexW
ReleaseMutex
OutputDebugStringA
GetFileSize
FindFirstFileW
CopyFileW
ReadFile
FindClose
DeleteFileW
DeviceIoControl
GetSystemDirectoryW
SetEnvironmentVariableA
user32
wsprintfW
CharNextW
wvsprintfW
LoadStringW
shell32
ShellExecuteExW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoInitialize
CoGetClassObject
CoUninitialize
CoCreateGuid
shlwapi
PathIsDirectoryW
PathAppendW
PathFileExistsW
SHSetValueW
StrCpyW
SHGetValueW
wininet
InternetReadFile
InternetQueryDataAvailable
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
HttpQueryInfoW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
psapi
GetModuleBaseNameW
netapi32
NetApiBufferFree
NetWkstaTransportEnum
Netbios
advapi32
RegCloseKey
OpenSCManagerW
OpenServiceW
QueryServiceStatus
CloseServiceHandle
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 672KB - Virtual size: 672KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ