Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_a15afb715c55b636edc2ec74e1f5d450_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_a15afb715c55b636edc2ec74e1f5d450_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_a15afb715c55b636edc2ec74e1f5d450_mafia
-
Size
848KB
-
MD5
a15afb715c55b636edc2ec74e1f5d450
-
SHA1
bf07b7498bb03a004445f656fdc316e516f37d26
-
SHA256
503c2eadd598be5778a429bb2319bf312104f30a31247d2431e5cccb6380656d
-
SHA512
40ad08332510409bd02f99a66cd49d48aaf58e083573fb5fa7e8a9e93024f431f897d48df6ad9b47b0fffbd9c5df631fd39c71b14d1e4a2ddd9284260967c6d3
-
SSDEEP
24576:8Z9SgtDN82tNa4DHHqbw31O6KMNE5CUVd/64:/gtJ1tQ4DHHqElizt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-01_a15afb715c55b636edc2ec74e1f5d450_mafia
Files
-
2024-01-01_a15afb715c55b636edc2ec74e1f5d450_mafia.exe windows:5 windows x86 arch:x86
b1b65a5e83e78aa703847949b8820af7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
lz32
LZOpenFileA
LZCopy
LZClose
user32
SetCapture
GetDialogBaseUnits
SetParent
SetCursor
DestroyMenu
ReleaseCapture
KillTimer
GetClassInfoA
RegisterClassA
LoadCursorA
RegisterWindowMessageA
MsgWaitForMultipleObjects
PeekMessageA
GetMessageA
TranslateMDISysAccel
TranslateMessage
DispatchMessageA
CharNextA
MessageBoxA
TrackPopupMenu
CreatePopupMenu
CreateMenu
IsMenu
AppendMenuA
GetCursorPos
GetScrollPos
DrawFocusRect
CharUpperA
CharLowerA
WaitMessage
SetTimer
GetWindowPlacement
PostQuitMessage
GetSysColor
CopyRect
IntersectRect
GetKeyState
ScrollWindowEx
FlashWindow
SetPropA
CreateWindowExA
GetWindowDC
RemovePropA
GetDesktopWindow
UpdateWindow
SetForegroundWindow
DefFrameProcA
DefMDIChildProcA
DefWindowProcA
CallWindowProcA
BeginPaint
EndPaint
GetPropA
SetWindowTextA
SetWindowLongA
SetWindowPos
LoadImageA
ShowWindow
SetLayeredWindowAttributes
EnableWindow
InvalidateRect
GetWindowRect
SetRectEmpty
DrawEdge
InflateRect
DrawTextA
GetFocus
IsWindowVisible
SetFocus
GetWindowLongA
IsWindowEnabled
GetWindow
GetParent
DestroyIcon
GetDC
ReleaseDC
ScreenToClient
IsRectEmpty
GetClientRect
ClipCursor
ClientToScreen
IsWindow
GetClassNameA
SendMessageA
GetWindowTextLengthA
GetWindowTextA
wsprintfA
gdi32
MoveToEx
LineTo
Rectangle
CreatePatternBrush
CreateSolidBrush
CreateFontIndirectA
SetWindowOrgEx
GetTextExtentPointA
CreateBitmap
ExtTextOutA
GetTextMetricsA
CreateRectRgnIndirect
SetBkColor
GetStockObject
GetTextExtentPoint32A
SetBkMode
SetTextColor
SetBrushOrgEx
PatBlt
StretchDIBits
CreateCompatibleDC
GetObjectA
StretchBlt
BitBlt
DeleteObject
CreatePen
CreateICA
GetDeviceCaps
DeleteDC
SelectObject
comctl32
InitializeFlatSB
FlatSB_SetScrollProp
InitCommonControlsEx
ImageList_Add
ImageList_Create
_TrackMouseEvent
ImageList_GetIcon
ImageList_Duplicate
FlatSB_SetScrollRange
FlatSB_SetScrollPos
FlatSB_GetScrollPos
FlatSB_GetScrollRange
ImageList_ReplaceIcon
ImageList_Destroy
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
shell32
DragQueryFileA
CommandLineToArgvW
DragFinish
ExtractIconA
FindExecutableA
DragAcceptFiles
odbc32
ord59
ord12
ord16
ord47
ord30
ord76
ord18
ord8
ord2
ord1
ord39
ord7
ord41
ord45
ord50
ord22
ord4
ord40
ord43
ord72
ord11
ord3
ord17
ord36
ord10
ord29
ord9
ord14
ord15
ord19
zkernel
?zGridPutInt@@YGXPAUHWND__@@JHH@Z
?zGridDelete@@YGXPAUHWND__@@PBD@Z
?zDBGetPKkey@@YGFPAXPBDPAPAU_pkey_@@G@Z
?zGridBrowse@@YG_NPAUHWND__@@PAXPBD2222222222H@Z
?zGridExec@@YGPAXPAUHWND__@@PBD@Z
?zGridAggregate@@YGNPAUHWND__@@HPBD11_N@Z
?zDBExecScript@@YGHPAX0PBDFPAD@Z
?zGridPutLong@@YGXPAUHWND__@@JHJ@Z
?zDBError@@YGXPAX00PBD@Z
?zKernelInit@@YGXXZ
?zGridGetSuffix@@YGPBDPAUHWND__@@H@Z
?zGridGetPrefix@@YGPBDPAUHWND__@@H@Z
?zGridPutText@@YGXPAUHWND__@@JHPBD@Z
?zGridGetText@@YGPBDPAUHWND__@@JH_N@Z
?zGridGetCellRect@@YGXPAUHWND__@@JHPAUtagRECT@@@Z
?zGridPrepare@@YGPAXPAUHWND__@@PBD@Z
wsock32
ioctlsocket
ole32
CreateStreamOnHGlobal
CoCreateGuid
StringFromGUID2
oleaut32
OleLoadPicture
shlwapi
StrStrIA
msimg32
GradientFill
gdiplus
GdiplusShutdown
GdiplusStartup
GdipLoadImageFromStream
GdipCloneImage
GdipDrawImageRectI
GdipDrawImageI
GdipCreateFromHDC
GdipCreateBitmapFromStream
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipLoadImageFromStreamICM
uxtheme
DrawThemeBackground
SetWindowTheme
CloseThemeData
OpenThemeData
_dll0
?ZeroContext@@YA_NAAVcZero@@@Z
?VirtuaWinCurrentDesktopNumber@@YAHXZ
?K4@@YA_NPBDPAD0@Z
?ZeroOwner@@YA?AVxstring@@XZ
?ZeroDBcontext@@YA_NAAVzDB@@AAVcZero@@@Z
?SingleInstance@@YA_NAAV?$xsharedmemory@VshMem@@@@HH@Z
kernel32
GetComputerNameA
WideCharToMultiByte
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
GetProfileIntA
GetProfileStringA
GetPrivateProfileStringA
GetEnvironmentVariableA
lstrlenW
GlobalReAlloc
GlobalHandle
GetDiskFreeSpaceExA
UnlockFile
LockFile
SystemTimeToFileTime
FileTimeToSystemTime
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
MoveFileExA
DeleteFileA
CreateFileA
CopyFileA
LoadLibraryA
GetProcAddress
FreeLibrary
WritePrivateProfileStringA
GetFileSize
CloseHandle
SizeofResource
Sleep
FindResourceA
LoadResource
LockResource
FreeResource
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
FindClose
FindFirstFileA
GetDateFormatA
LocalFree
FormatMessageA
GetModuleHandleA
FlushFileBuffers
IsValidCodePage
ReadFile
WriteFile
OpenEventA
CreateEventA
SetCurrentDirectoryA
GetShortPathNameA
FindNextFileA
SetFilePointer
GetUserDefaultLangID
GetCommandLineW
GetCommandLineA
GetModuleFileNameA
GlobalSize
SetEvent
UnmapViewOfFile
LocalUnlock
LocalLock
LocalAlloc
RtlUnwind
RaiseException
GetCurrentDirectoryW
SetCurrentDirectoryW
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
HeapAlloc
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
SetFileAttributesA
GlobalFree
GetTempFileNameA
GetLastError
GetLocalTime
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetTimeZoneInformation
GetConsoleCP
LCMapStringW
ExitProcess
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetModuleFileNameW
HeapCreate
HeapSize
FreeEnvironmentStringsW
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetProcessHeap
SetEndOfFile
WriteConsoleW
LoadLibraryW
SetStdHandle
HeapReAlloc
GetEnvironmentStringsW
GetConsoleMode
QueryPerformanceCounter
Sections
.text Size: 325KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 399KB - Virtual size: 398KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ