Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_a0285d4f29de416c6f9f8b87f6fccd07_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-24_a0285d4f29de416c6f9f8b87f6fccd07_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_a0285d4f29de416c6f9f8b87f6fccd07_mafia
-
Size
376KB
-
MD5
a0285d4f29de416c6f9f8b87f6fccd07
-
SHA1
6cf5aaf2689ce04ac272e191fc9208172545a578
-
SHA256
4221598a2adc202daa63ce084f8fbb662c64991f84fe2005c69a047362a6f27b
-
SHA512
3bf2d1531c19728ec26a3c037ff24cfe6d8e42d4ac2e1958d7b8e7bbb99c2522f612e5d8e582dd86b7a1e27a74e9e1baf1f7a79e90a9ba3f3b2b7950a70f35c8
-
SSDEEP
6144:UbJiJNx72jxKPodGVLi64kIfbzRPsb8+NbbM72nNGXDRF:UbJiJNx72WTLifkSRPL+NbbM7kN2z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-24_a0285d4f29de416c6f9f8b87f6fccd07_mafia
Files
-
2024-01-24_a0285d4f29de416c6f9f8b87f6fccd07_mafia.exe windows:5 windows x86 arch:x86
5c49124b182bf37830f219002d762afd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
opencl
clGetPlatformIDs
clGetPlatformInfo
clGetDeviceInfo
clCreateContext
clCreateCommandQueue
clCreateProgramWithSource
clBuildProgram
clReleaseEvent
clCreateKernel
clSetKernelArg
clEnqueueNDRangeKernel
clFinish
clEnqueueMarkerWithWaitList
clCreateImage2D
clCreateBuffer
clEnqueueWriteBuffer
clGetImageInfo
clGetExtensionFunctionAddressForPlatform
clGetEventInfo
clGetProgramBuildInfo
kernel32
ReadFile
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
HeapSetInformation
GetCommandLineW
ExitProcess
GetSystemTimeAsFileTime
HeapFree
RtlUnwind
HeapAlloc
DecodePointer
EncodePointer
MultiByteToWideChar
InterlockedCompareExchange
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleW
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CloseHandle
CreateThread
InitializeCriticalSection
SwitchToThread
FindClose
FindNextFileW
FindFirstFileW
GetLastError
GetModuleFileNameW
WriteFile
LoadLibraryW
SetThreadErrorMode
GetProcAddress
FreeLibrary
InterlockedIncrement
GetCurrentProcessId
InterlockedDecrement
LocalFree
SetEndOfFile
CreateFileW
WriteConsoleW
CreateFileA
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetCurrentThreadId
GetStdHandle
HeapCreate
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
GetProcessHeap
GetStringTypeW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
WideCharToMultiByte
RaiseException
LoadLibraryA
InterlockedExchange
LocalAlloc
GetStartupInfoW
SetFilePointer
IsProcessorFeaturePresent
GetLocaleInfoW
TlsAlloc
GetFileType
user32
DefWindowProcW
MonitorFromWindow
DestroyWindow
PostQuitMessage
GetSystemMetrics
SetWindowPos
SetWindowLongW
AdjustWindowRectEx
GetWindowInfo
LoadCursorW
RegisterClassW
EnumDisplayMonitors
CreateWindowExW
ShowWindow
UpdateWindow
GetWindowLongW
SetWindowTextW
PeekMessageW
TranslateMessage
DispatchMessageW
GetClientRect
IsRectEmpty
GetMonitorInfoW
advapi32
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
ole32
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoInitialize
dxva2
DXVA2CreateDirect3DDeviceManager9
DXVA2CreateVideoService
d3d9
Direct3DCreate9Ex
Sections
.text Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 201.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ