E:\projects\ls\windows\hs\ver2\s\exe\Debug\exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_357a5ddd66a1e80570d9f9eac6e7d59b_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-06_357a5ddd66a1e80570d9f9eac6e7d59b_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_357a5ddd66a1e80570d9f9eac6e7d59b_mafia
-
Size
958KB
-
MD5
357a5ddd66a1e80570d9f9eac6e7d59b
-
SHA1
b75e596fcb14bdda20248ac32fdc6144f7be72cf
-
SHA256
d3639cad328b20d15051d66eec1ccb38aa1f3167eab1c424c4a1e21f030cc788
-
SHA512
51e95cc220d1ae3a2d6c83a297ae5b50c5d87951fcb2fe157468f13fa390493c73710a109e93fb53ef0f5d8c92f3fe4aef4b29a653d380d548e481612236ef02
-
SSDEEP
24576:RtG1/1JVIfO7Vk7wcdNVal89hHpViUtTI:RtEz767wKal89hLTI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-06_357a5ddd66a1e80570d9f9eac6e7d59b_mafia
Files
-
2024-09-06_357a5ddd66a1e80570d9f9eac6e7d59b_mafia.exe windows:5 windows x86 arch:x86
ed3bae7cd939fdf401816063ade4bb1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
GetProcAddress
SetEndOfFile
ReadFile
InterlockedExchange
GetLocaleInfoW
GetFileAttributesA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetStringTypeW
CreateFileA
FlushFileBuffers
SetStdHandle
GetFileTime
CloseHandle
WriteFile
SetFileTime
GetModuleFileNameA
GetTempPathA
GetModuleHandleA
FindResourceA
SizeofResource
GetUserDefaultLCID
LoadResource
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
DecodePointer
RaiseException
WideCharToMultiByte
IsDebuggerPresent
MultiByteToWideChar
lstrlenA
LoadLibraryW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
HeapValidate
IsBadReadPtr
GetLastError
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
RtlUnwind
LCMapStringW
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThread
FatalAppExitA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
HeapSize
HeapQueryInformation
CreateFileW
user32
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
PostQuitMessage
PostMessageA
DestroyWindow
DefWindowProcA
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
ControlService
RegDeleteValueA
StartServiceA
CloseServiceHandle
RegOpenKeyA
Sections
.textbss Size: - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 367KB - Virtual size: 367KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 496KB - Virtual size: 496KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ