Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_637e95901f1c699a8424da209b96bacd_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_637e95901f1c699a8424da209b96bacd_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_637e95901f1c699a8424da209b96bacd_mafia
-
Size
2.3MB
-
MD5
637e95901f1c699a8424da209b96bacd
-
SHA1
137b013853658e29746f72334179da1e2bd828f4
-
SHA256
eddcc7f1f524f973449b09dda7c015035d3737d0be2572232a2131cf45f53028
-
SHA512
8821356f54abcb17d3766048d5f05f401cfaf584a9dea12090ff4aa8ccf0e755e969d9968df58942c2e0aced24fddea77064266ca55574b94a783d52268ccc89
-
SSDEEP
49152:kWpQTW3vYptbUE0QI662K8E11Jkc/ookTD79C6A4tVxckwDPksDM2jh3BqS7YtGz:UptbUE0Qw2K51Jkc/ooYk45x76MMQS7z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-08_637e95901f1c699a8424da209b96bacd_mafia
Files
-
2024-01-08_637e95901f1c699a8424da209b96bacd_mafia.exe windows:5 windows x86 arch:x86
1ca0524118d0fda0a70479ae0d39af0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetModuleHandleExW
GetSystemDirectoryA
GetModuleFileNameA
GetTempPathA
LocalFree
CreateFileA
MoveFileExA
GetTickCount
GetFileAttributesA
FindFirstFileA
SetLastError
RemoveDirectoryA
SetFileAttributesA
FindClose
FindNextFileA
CloseHandle
DeleteFileA
Sleep
FormatMessageW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
FindResourceA
LoadResource
SizeofResource
LockResource
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
FreeLibrary
LoadLibraryW
InterlockedIncrement
InterlockedExchange
GetStringTypeW
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
GetModuleHandleA
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetModuleFileNameW
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
ReadFile
SetFilePointer
FlushFileBuffers
HeapSize
SetStdHandle
SetEndOfFile
GetProcessHeap
WriteConsoleW
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
CreateFileW
GetProcAddress
GetLastError
CreateDirectoryA
CreateProcessA
SetDllDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetModuleHandleExA
EncodePointer
RaiseException
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 584KB - Virtual size: 588KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE