E:\KuaiwanBox\bin\waTip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-01_321611d307441eb42214862718700c41_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-01_321611d307441eb42214862718700c41_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-01_321611d307441eb42214862718700c41_mafia
-
Size
332KB
-
MD5
321611d307441eb42214862718700c41
-
SHA1
d6700deff0325521fd7db52e1958eff6e5526f88
-
SHA256
2eaebb679ab7878616faab73897852334919c47188e31aab8453afe4cf393db1
-
SHA512
0a5252108070401231e940c3f9b87f686b8ca7bf4a6851d2d03b01e473b1b9d4df97fa13b11c5d10da04bbacaaad12135344ca61b22bd7cd3b335c58e7a064e6
-
SSDEEP
6144:z+KrFfNN0xAIVTvVx8wb2gFiEHtJGzOyyYoiUHOtJQ05Yte1GOjB:aKrFfNNnIJVfb27EnGayyxXOg05Yte1R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-01_321611d307441eb42214862718700c41_mafia
Files
-
2024-09-01_321611d307441eb42214862718700c41_mafia.exe windows:5 windows x86 arch:x86
1253f7ff3c1a4323027d06c1717eb5ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcessId
GetPrivateProfileStringW
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SizeofResource
GetLastError
GetProcAddress
lstrcmpiW
DeleteCriticalSection
GlobalAlloc
MulDiv
CreateDirectoryW
OpenEventW
CreateEventW
SetUnhandledExceptionFilter
CloseHandle
GlobalUnlock
GlobalFree
CreateThread
CreateFileW
ReadFile
WriteConsoleW
SetStdHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
LoadLibraryW
GetTickCount
QueryPerformanceCounter
GetLocalTime
SetHandleCount
GetEnvironmentStringsW
GetFileAttributesW
HeapCreate
GetLocaleInfoW
GetStdHandle
WriteFile
HeapSize
HeapReAlloc
GetStringTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
RtlUnwind
GetCPInfo
LCMapStringW
ExitProcess
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InitializeCriticalSection
Sleep
InterlockedExchange
LocalFree
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
WideCharToMultiByte
lstrcmpW
MultiByteToWideChar
InterlockedIncrement
lstrlenW
SetLastError
RaiseException
WritePrivateProfileStringW
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
lstrlenA
OutputDebugStringW
DebugBreak
FreeEnvironmentStringsW
GlobalLock
GetPrivateProfileIntW
GetSystemTime
GetModuleFileNameW
GetFileType
InterlockedDecrement
user32
wvsprintfW
CharNextW
SetWindowLongW
DestroyWindow
PostQuitMessage
LoadStringW
KillTimer
GetClientRect
GetCursorPos
WindowFromPoint
UnregisterClassA
PostMessageW
SendMessageW
UnregisterClassW
SetTimer
IsWindow
DispatchMessageW
TranslateMessage
GetMessageW
RegisterClassExW
GetClassInfoExW
LoadCursorW
GetClassNameW
GetParent
GetFocus
IsChild
CreateWindowExW
DestroyCursor
SetCursor
GetDesktopWindow
OffsetRect
GetWindowLongW
DefWindowProcW
CallWindowProcW
SystemParametersInfoW
SetWindowPos
GetDC
ReleaseDC
SetWindowRgn
ShowWindow
ScreenToClient
RedrawWindow
IsWindowVisible
IntersectRect
TrackMouseEvent
SetForegroundWindow
SetFocus
SetCapture
ReleaseCapture
GetWindowThreadProcessId
GetWindowRect
MoveWindow
MapWindowPoints
IsDialogMessageW
GetMonitorInfoW
MonitorFromWindow
GetWindow
DestroyAcceleratorTable
InvalidateRect
InvalidateRgn
FillRect
ClientToScreen
CreateAcceleratorTableW
GetSysColor
GetDlgItem
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
BeginPaint
EndPaint
gdi32
GetObjectW
GetDeviceCaps
CombineRgn
CreateRectRgn
GetStockObject
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
CreateSolidBrush
advapi32
RegCreateKeyExW
RegOpenKeyW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
shell32
ShellExecuteW
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
StringFromCLSID
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CLSIDFromString
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
StringFromGUID2
CoTaskMemRealloc
oleaut32
SysAllocStringLen
LoadTypeLi
LoadRegTypeLi
SysStringLen
OleCreateFontIndirect
SysFreeString
VarUI4FromStr
VariantInit
SysAllocString
VariantClear
comctl32
ord17
InitCommonControlsEx
ws2_32
WSAStartup
WSACleanup
nettool
SetDocsParam
PostDocs
?GetDownloadURL@NetTool@@SA_NPB_WPAPAXPAJJH@Z
gdiplus
GdipBitmapGetPixel
GdipCreateHBITMAPFromBitmap
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipDeleteFont
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipSetStringFormatTrimming
GdipDrawString
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipMeasureString
GdipDeleteGraphics
GdipCreateFromHWND
GdiplusStartup
GdipCreatePen1
GdipDrawRectangleI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipFillRectangleI
GdipCreateBitmapFromHBITMAP
GdipDrawImageRectRectI
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromFile
GdipTranslateWorldTransform
GdipCloneImage
GdipAlloc
GdipDisposeImage
GdipFree
GdiplusShutdown
GdipDeletePen
GdipCreateFont
Sections
.text Size: 249KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ