E:\辅助开发\Release\xajh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_eb8e04e45af093495c465b38bbbeab2b_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-06_eb8e04e45af093495c465b38bbbeab2b_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_eb8e04e45af093495c465b38bbbeab2b_mafia
-
Size
5.3MB
-
MD5
eb8e04e45af093495c465b38bbbeab2b
-
SHA1
1e3659b3e9bcba7843665159b86194750d39a852
-
SHA256
eafb4cbb5bbbf8334fe0c21bfa6ec04025e670dbef774f1c6fcca6f4afc06756
-
SHA512
66243bec31da6fe3a8d29611ad95f8db8140de9ed5278604e71760e05febd10690d0d9acc75781249eb6a2883c0709f5a4f01b01f66b09dfc9e8fd67b3bcbdbd
-
SSDEEP
98304:WOM30AlDdeOlkehnYco/hvB6bVozb5q1y7u:40Axlkehq/hvEwS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-06_eb8e04e45af093495c465b38bbbeab2b_mafia
Files
-
2024-09-06_eb8e04e45af093495c465b38bbbeab2b_mafia.exe windows:5 windows x86 arch:x86
1b1120d524b8bf806b5ee5c238f48929
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateEventA
lstrcpynW
Beep
TerminateProcess
ReadFile
GetModuleFileNameW
CreateFileW
lstrcatA
lstrcmpW
MultiByteToWideChar
lstrlenW
GetStartupInfoW
WritePrivateProfileStringW
RaiseException
GetPrivateProfileIntW
GetLastError
lstrcmpiA
GetProcAddress
VirtualAllocEx
GlobalFree
FindClose
GetLocalTime
CreateFileMappingW
GetExitCodeThread
LockResource
CreateEventW
GetModuleFileNameA
lstrcmpiW
lstrcatW
FindNextFileW
VirtualProtect
CloseHandle
DeleteFileW
GetCurrentProcessId
GlobalReAlloc
WriteProcessMemory
ResumeThread
lstrcpyW
CreateThread
lstrcpyA
GetFileSize
lstrcmpA
ReadProcessMemory
SizeofResource
CopyFileW
Sleep
LoadLibraryW
VirtualFreeEx
WideCharToMultiByte
GlobalAlloc
WriteFile
CreateRemoteThread
SetEnvironmentVariableA
CompareStringW
LCMapStringW
SetStdHandle
GetConsoleCP
SystemTimeToTzSpecificLocalTime
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
ExitProcess
GetTimeZoneInformation
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
RtlUnwind
ExitThread
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
SetConsoleCtrlHandler
WriteConsoleW
HeapSetInformation
GetCommandLineW
DecodePointer
EncodePointer
DeleteFileA
AreFileApisANSI
GetSystemTime
LocalFree
GetTempPathA
GetVersionExA
OutputDebugStringA
DeleteCriticalSection
GetFileAttributesExW
GetSystemInfo
GetDiskFreeSpaceA
CreateFileMappingA
GetPrivateProfileStringW
GetTickCount
GetModuleHandleW
SetEvent
WaitForSingleObject
GlobalLock
CreateDirectoryW
SystemTimeToFileTime
LoadResource
FindResourceW
SetEndOfFile
lstrcpynA
UnmapViewOfFile
MapViewOfFile
SetLocalTime
lstrlenA
SetFilePointer
FindFirstFileW
GetDiskFreeSpaceW
EnterCriticalSection
LockFileEx
CreateFileA
HeapSize
GetTempPathW
FlushFileBuffers
GetFileAttributesW
HeapValidate
HeapCreate
GetFileAttributesA
LeaveCriticalSection
HeapDestroy
GetVersionExW
FormatMessageW
IsProcessorFeaturePresent
CreateProcessW
InitializeCriticalSection
FormatMessageA
GetSystemTimeAsFileTime
GetProcessHeap
UnlockFileEx
OutputDebugStringW
WaitForSingleObjectEx
LockFile
FlushViewOfFile
UnlockFile
InterlockedCompareExchange
HeapFree
HeapAlloc
TryEnterCriticalSection
HeapCompact
CreateMutexW
HeapReAlloc
GetFullPathNameA
GetFullPathNameW
FlushConsoleInputBuffer
LoadLibraryA
FreeLibrary
GlobalMemoryStatus
QueryPerformanceCounter
GetCurrentThreadId
GetVersion
GetFileType
GetStdHandle
user32
mouse_event
CheckMenuItem
DefWindowProcW
GetDlgItemTextA
MoveWindow
DispatchMessageW
CreateMenu
GetDlgCtrlID
SetClipboardData
EnableWindow
UpdateWindow
SendMessageW
SetDlgItemTextW
GetProcessWindowStation
GetUserObjectInformationW
GetDlgItemTextW
IsWindowVisible
GetSystemMetrics
MessageBoxW
OpenClipboard
InsertMenuW
ClientToScreen
DestroyWindow
SetCursor
CloseClipboard
TranslateAcceleratorW
SetTimer
ScreenToClient
GetWindowRect
GetMessageW
PostQuitMessage
SendDlgItemMessageA
TrackPopupMenu
IsIconic
GetTopWindow
PostMessageW
KillTimer
GetSubMenu
SetForegroundWindow
CreateWindowExW
GetFocus
GetParent
GetMenuStringW
wsprintfA
WindowFromPoint
GetClientRect
DeleteMenu
SetFocus
SendMessageA
EnumWindows
wsprintfW
TranslateMessage
LoadAcceleratorsW
GetForegroundWindow
RegisterClassExW
FlashWindowEx
MessageBoxA
LoadMenuW
GetWindowLongW
GetWindowTextW
EmptyClipboard
GetMenuState
GetDlgItem
SetWindowLongW
SendDlgItemMessageW
GetDesktopWindow
GetSysColor
SetWindowPos
GetCursorPos
GetMenuStringA
CheckDlgButton
ShowWindow
IsDlgButtonChecked
CreateDialogParamW
gdi32
SetTextColor
CreateFontIndirectW
SetBkColor
GetStockObject
CreateSolidBrush
comdlg32
GetOpenFileNameW
advapi32
RegCloseKey
ReportEventA
DeregisterEventSource
RegSetValueExW
RegisterEventSourceA
RegDeleteValueW
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegCreateKeyW
shell32
DragQueryFileW
SHGetSpecialFolderLocation
ShellExecuteW
ShellExecuteA
SHGetPathFromIDListA
ole32
CoTaskMemFree
CoCreateGuid
CoInitializeSecurity
CoCreateInstance
CoInitializeEx
oleaut32
SysFreeString
VariantClear
comctl32
ord17
shlwapi
PathFindFileNameW
ws2_32
connect
WSAStartup
inet_addr
socket
closesocket
gethostbyname
send
listen
bind
htons
getsockname
recv
accept
rasapi32
RasEnumEntriesW
RasHangUpW
RasDialW
RasEnumConnectionsW
RasGetProjectionInfoW
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 101KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ