D:\git\windows\aqup\src\global\bin\udisk-std\Win32\Release\secureHDiskShell.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-15_a1b07d5b038055ddf47d5c8f4c0638cd_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-15_a1b07d5b038055ddf47d5c8f4c0638cd_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-15_a1b07d5b038055ddf47d5c8f4c0638cd_mafia
-
Size
412KB
-
MD5
a1b07d5b038055ddf47d5c8f4c0638cd
-
SHA1
e72f0778cb0543ed84b4d44b3fa4a41a0a295c12
-
SHA256
6d19b33dd48a6bc7ab28214400ea4ff9e5309d6bea78c412dc28926307cc3654
-
SHA512
7975629fe57e97db1142af798c8d3d1e0d43990d0d14ab162bf1bdaa7ba486254efb5d34830ff6b6e24b5096814d7a88bf93fff69dbf058ef6440a4be87fe3a6
-
SSDEEP
3072:gS9ySFmtDLPgRYtqwVZSVir1XgpIhbAoI4Vcu874FCdWw+Zne3tM4XxPUTHMaqMi:b9yNXqKcVI7AoIYciZ0tyYaOHbII
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-15_a1b07d5b038055ddf47d5c8f4c0638cd_mafia
Files
-
2024-09-15_a1b07d5b038055ddf47d5c8f4c0638cd_mafia.exe windows:5 windows x86 arch:x86
e0e277554fce4eef5f67da588fe8dc33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryExA
VirtualQuery
Process32First
GetStartupInfoW
GetLastError
GetLocalTime
Process32Next
GetModuleFileNameA
CreateToolhelp32Snapshot
CreateFileA
SetUnhandledExceptionFilter
GetCurrentProcess
CloseHandle
GetFileAttributesA
GetSystemDirectoryA
CreateDirectoryA
FindFirstFileA
CopyFileA
SetFileAttributesA
FindClose
FindNextFileA
CreateMutexA
IsDebuggerPresent
GetCurrentThreadId
GetCurrentProcessId
DeleteFileA
InitializeCriticalSection
SetEnvironmentVariableA
CompareStringW
GetVersionExA
OutputDebugStringA
GetModuleHandleA
LoadLibraryA
GetProcAddress
Sleep
FreeLibrary
MultiByteToWideChar
GetTickCount
WideCharToMultiByte
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileW
GetStringTypeW
LCMapStringW
HeapFree
EnterCriticalSection
LeaveCriticalSection
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
RemoveDirectoryA
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
TerminateProcess
UnhandledExceptionFilter
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
RaiseException
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
GetModuleHandleW
ExitProcess
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetTimeZoneInformation
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
HeapSize
HeapReAlloc
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetDriveTypeW
SetEndOfFile
GetProcessHeap
advapi32
FreeSid
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteA
ShellExecuteExA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 206KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ