C:\project_missile\project_V4S\V4S\Program\VSProject\Maihana.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_57b27fc7b325347bacdc74ce12622aac_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_57b27fc7b325347bacdc74ce12622aac_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_57b27fc7b325347bacdc74ce12622aac_mafia
-
Size
1.3MB
-
MD5
57b27fc7b325347bacdc74ce12622aac
-
SHA1
8adb8f6c57fa2d5f19084f1d24a87a38141ecf3d
-
SHA256
cac723d6b295ab491772924d6acc46b97877717708c68ec4415b884a6ce0b24c
-
SHA512
efaddb5c3184ae8f81b882590842287295e3d8cda1c61afad0f3f11ca442b31558da51d8acfba072ecd6ec72a7972c579b07332d2ba1bd604c729f603c779e43
-
SSDEEP
24576:69SavC7COrJmqslh6BitZw3woWJuMRbPVMbkTjKQk3e66XecQKFqrUbbm3w8KIUG:sHvC7BrJmqslkBitZw3woWJuMRbPVKkw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-13_57b27fc7b325347bacdc74ce12622aac_mafia
Files
-
2024-10-13_57b27fc7b325347bacdc74ce12622aac_mafia.exe windows:5 windows x86 arch:x86
84543d45517e492eea6772ad37b3c85e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetCurrentDirectoryA
GetModuleHandleA
CreateFileA
CompareFileTime
FileTimeToSystemTime
GetFileTime
OutputDebugStringA
FileTimeToLocalFileTime
WaitForSingleObject
FormatMessageA
CreateSemaphoreA
ReleaseSemaphore
GetLastError
CreateThread
GetCurrentProcess
GetVersionExA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
GetFileSize
ReadFile
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetFilePointer
QueryPerformanceFrequency
GetFileAttributesA
LCMapStringW
CompareStringW
GetProcAddress
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
GetTimeZoneInformation
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThread
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
GetModuleFileNameW
GetStdHandle
QueryPerformanceCounter
ResumeThread
CloseHandle
GetExitCodeThread
SetThreadPriority
WritePrivateProfileStringA
GetPrivateProfileStringA
SetFileAttributesA
CreateDirectoryA
Sleep
CreatePipe
LoadLibraryA
WriteFile
HeapCreate
RaiseException
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCurrentProcessId
FreeLibrary
InterlockedIncrement
InterlockedDecrement
GetDateFormatA
GetTimeFormatA
DeleteFileA
GetThreadPriority
VirtualFree
VirtualAlloc
GetSystemInfo
CreateEventA
MulDiv
ResetEvent
SetEvent
InitializeCriticalSection
WaitForMultipleObjects
CreateFileW
SetEnvironmentVariableA
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
MoveFileA
DuplicateHandle
CreateProcessA
RtlUnwind
HeapReAlloc
GetStartupInfoW
HeapSetInformation
GetCommandLineA
EncodePointer
GetSystemTimeAsFileTime
GetCurrentThreadId
ExitThread
DecodePointer
ExitProcess
GetModuleHandleW
HeapAlloc
HeapFree
FlushFileBuffers
GetLocaleInfoA
GetUserDefaultLCID
GetExitCodeProcess
user32
SetForegroundWindow
PostQuitMessage
PostMessageA
GetAsyncKeyState
SetWindowPos
MessageBoxA
IsIconic
GetWindowRect
GetActiveWindow
GetCursorPos
ClientToScreen
RegisterClassA
LoadCursorA
FindWindowA
AdjustWindowRect
UpdateWindow
LoadIconA
GetSystemMetrics
DispatchMessageA
ShowWindow
PostThreadMessageA
GetQueueStatus
MsgWaitForMultipleObjects
wvsprintfA
wsprintfA
DefWindowProcA
PeekMessageA
CreateWindowExA
RegisterWindowMessageA
GetWindowPlacement
ShowCursor
TranslateMessage
SetWindowPlacement
IsWindowVisible
IsCharAlphaNumericA
DestroyWindow
EnumWindows
gdi32
GetGlyphOutlineA
GetTextExtentPoint32A
DeleteDC
CreateFontIndirectA
RemoveFontMemResourceEx
DeleteObject
SelectObject
CreateCompatibleDC
AddFontMemResourceEx
GetTextMetricsA
GetStockObject
shell32
ShellExecuteA
ole32
CoTaskMemAlloc
CoFreeUnusedLibraries
CoInitialize
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
dinput8
DirectInput8Create
d3d9
Direct3DCreate9
d3dx9_43
D3DXMatrixRotationY
D3DXMatrixRotationX
D3DXVec3Transform
D3DXMatrixRotationZ
D3DXMatrixTranslation
D3DXMatrixTranspose
D3DXVec3Normalize
D3DXSaveSurfaceToFileA
D3DXVec3TransformNormal
D3DXCreateTextureFromFileInMemoryEx
D3DXCreateEffect
D3DXMatrixLookAtRH
D3DXMatrixPerspectiveFovRH
D3DXVec3TransformCoord
D3DXMatrixMultiply
D3DXMatrixScaling
D3DXMatrixInverse
winmm
timeKillEvent
timeEndPeriod
timeGetTime
timeBeginPeriod
timeSetEvent
x3daudio1_7
X3DAudioCalculate
X3DAudioInitialize
wininet
InternetOpenUrlA
InternetReadFile
InternetOpenA
InternetCloseHandle
Sections
.text Size: 959KB - Virtual size: 958KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ