C:\HUDSON\workspace\Autoupdate2.1-update\obj\jaureg\Release\jaureg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_2c98f5b70dd982e175d182dab1ea0688_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_2c98f5b70dd982e175d182dab1ea0688_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_2c98f5b70dd982e175d182dab1ea0688_mafia
-
Size
1.4MB
-
MD5
2c98f5b70dd982e175d182dab1ea0688
-
SHA1
14d7e3473436f2e889473be3b877004ccfd12838
-
SHA256
31609928d5311674a851704d44038d1f2fa5e306a3bf54dbb13b28e5b92757aa
-
SHA512
28ce3556cfaa7076bb23a5c7657add0f96cfa2403f59970cfe9feef152c41ec6b299ae5b6292686f915f0ac2d9cd5ba2a329fe4dc3563c0934b1163d3f8d020b
-
SSDEEP
24576:fZ1IdfnNYt5EQkbvK8N3t3QVkLhoo+SVfhl2/:fZe9NYt5ErvL73RLSo+2fhl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-18_2c98f5b70dd982e175d182dab1ea0688_mafia
Files
-
2024-10-18_2c98f5b70dd982e175d182dab1ea0688_mafia.exe windows:5 windows x86 arch:x86
af5075a440011bc9bc945b0a64ca6343
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetDllDirectoryA
CreateDirectoryA
GetCommandLineA
lstrcmpA
LocalFree
lstrcmpiA
GetLastError
WaitForSingleObject
CreateProcessA
GetExitCodeProcess
GlobalAlloc
InitializeCriticalSection
IsValidLocale
GetSystemDirectoryA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
lstrcatA
GetTempPathA
CreateMutexA
EnumSystemLocalesA
GetLocaleInfoA
GetSystemTimeAsFileTime
HeapFree
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
EnterCriticalSection
LeaveCriticalSection
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
HeapAlloc
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
WideCharToMultiByte
GetTimeZoneInformation
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
IsProcessorFeaturePresent
RaiseException
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
ReadFile
FlushFileBuffers
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
MultiByteToWideChar
WriteConsoleW
SetStdHandle
GetDriveTypeW
SetEndOfFile
GetProcessHeap
LCMapStringW
GetStringTypeW
CreateFileW
CompareStringW
SetEnvironmentVariableA
GetUserDefaultLCID
user32
wsprintfA
advapi32
RegDeleteValueA
RegCloseKey
RegEnumKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegSetValueExA
shell32
SHGetFolderPathA
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE