C:\昇泰安\龙宇\工作室\解压源码\便压安装脚本2014\SetupApp\bin\SetupApp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_4e5c942157529a2b5e37a456c5f604c0_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_4e5c942157529a2b5e37a456c5f604c0_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_4e5c942157529a2b5e37a456c5f604c0_mafia
-
Size
2.0MB
-
MD5
4e5c942157529a2b5e37a456c5f604c0
-
SHA1
01324bd919fd8ef7de6c1979e530c13b2d6e2b82
-
SHA256
15fcdbea25eb991b002eced1a5452e3134cdebbd3e8ccf11265b01e13b840c8d
-
SHA512
3ab93f4384f9fd5272d0ab96d47e235a847fe060ff9c448975e7b246f8c109d230b5ec382039d049498bbd54939940e9c98afeaf21cf80cb5556b1dc7229aa17
-
SSDEEP
49152:tkkAgF7qpHhvYL/bH1rr/vBHi3TXUNGgZNX9kqZc1t:t4pHhvYzprr/vBHijXUMgBZc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-13_4e5c942157529a2b5e37a456c5f604c0_mafia
Files
-
2024-09-13_4e5c942157529a2b5e37a456c5f604c0_mafia.exe windows:5 windows x86 arch:x86
6c0c957f7e8cb96552b5945210ae1cba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Process32First
GetLastError
Process32Next
CreateMutexA
CreateToolhelp32Snapshot
GetVolumeInformationA
DeviceIoControl
GetVersionExA
GetFileAttributesA
GetProcAddress
GetSystemInfo
OutputDebugStringA
WinExec
lstrlenA
DosDateTimeToFileTime
SetFilePointer
SystemTimeToFileTime
SetFileTime
ReadFile
GetFileType
GetCurrentDirectoryW
GetFullPathNameA
GetDriveTypeW
lstrcmpA
CreateFileW
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetStringTypeW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetHandleCount
IsValidCodePage
GetOEMCP
LoadLibraryW
InitializeCriticalSectionAndSpinCount
HeapCreate
IsProcessorFeaturePresent
GetLocaleInfoW
WriteFile
CreateFileA
GetACP
WideCharToMultiByte
MultiByteToWideChar
LockResource
SizeofResource
LoadResource
FreeResource
FindResourceA
TerminateThread
DeleteFileA
CloseHandle
GetModuleHandleA
GetModuleFileNameA
WritePrivateProfileStringA
GetLocalTime
GetPrivateProfileStringA
SetFileAttributesA
CreateDirectoryA
TerminateProcess
Sleep
OpenProcess
GetCurrentProcess
IsDBCSLeadByteEx
GetModuleFileNameW
GetStdHandle
SetLastError
TlsFree
TlsSetValue
TlsGetValue
InterlockedIncrement
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
GetCPInfo
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
MoveFileA
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleW
HeapFree
CreateThread
GetCurrentThreadId
ExitThread
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DecodePointer
EncodePointer
InterlockedExchange
InterlockedDecrement
user32
SetWindowPos
GetDlgItem
CreateWindowExA
MessageBoxA
TranslateMessage
SendMessageA
GetClientRect
SendDlgItemMessageA
PostQuitMessage
ShowWindow
GetMessageA
DestroyWindow
EndPaint
wvsprintfA
PostMessageA
EnableWindow
SetDlgItemTextA
GetDlgItemTextA
DispatchMessageA
GetSystemMetrics
LoadImageA
CreateDialogParamA
IsDlgButtonChecked
BeginPaint
gdi32
CreateFontA
advapi32
OpenProcessToken
OpenSCManagerA
StartServiceA
CreateServiceA
CloseServiceHandle
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExA
RegCreateKeyExA
LookupPrivilegeValueA
RegQueryValueExA
RegSetValueExA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHCreateDirectoryExA
SHBrowseForFolderA
SHGetPathFromIDListA
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
gdiplus
GdipFillRectangleI
GdipDrawLineI
GdipCreateFromHDC
GdiplusStartup
GdipCreateFontFamilyFromName
GdipDrawString
GdipCreateFont
GdipCreateSolidFill
GdipDeleteFontFamily
GdipDeleteGraphics
GdipDeleteFont
GdipDeletePen
GdipDeleteBrush
GdipCreatePen1
wininet
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
HttpQueryInfoA
HttpSendRequestA
shlwapi
UrlGetPartA
PathFileExistsA
PathStripPathA
PathRemoveBackslashA
netapi32
Netbios
sensapi
IsNetworkAlive
psapi
EnumProcesses
EnumProcessModules
GetModuleFileNameExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ