Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_b948d78b518ba2db11de4b96527e4727_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_b948d78b518ba2db11de4b96527e4727_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-29_b948d78b518ba2db11de4b96527e4727_mafia
-
Size
376KB
-
MD5
b948d78b518ba2db11de4b96527e4727
-
SHA1
4bc61587ede5ae18cafc17fb1d04a0fa491d1be3
-
SHA256
1129f4af70c819695ebba6d6bfcb049e8c4f03692e5ac19ee5438aefd5511108
-
SHA512
a5bbd3c85d343298e366bb85130d532486dd1488d1f2985da7dbbe50e43657b68b23450403fd2eb0ab2981448df61d8b76bdf5b7d303b6fdb0ef32eb6de69a9c
-
SSDEEP
6144:U/b/JNxUptu5hNLj5uFRnOPDWIzP7br+YbmrE6+G+lBfJ:U/b/JNxUpY6Rn0bPr+YbmrEJ/nJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-29_b948d78b518ba2db11de4b96527e4727_mafia
Files
-
2024-01-29_b948d78b518ba2db11de4b96527e4727_mafia.exe windows:5 windows x86 arch:x86
5c49124b182bf37830f219002d762afd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
opencl
clGetPlatformIDs
clGetPlatformInfo
clGetDeviceInfo
clCreateContext
clCreateCommandQueue
clCreateProgramWithSource
clBuildProgram
clReleaseEvent
clCreateKernel
clSetKernelArg
clEnqueueNDRangeKernel
clFinish
clEnqueueMarkerWithWaitList
clCreateImage2D
clCreateBuffer
clEnqueueWriteBuffer
clGetImageInfo
clGetExtensionFunctionAddressForPlatform
clGetEventInfo
clGetProgramBuildInfo
kernel32
ReadFile
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
HeapSetInformation
GetCommandLineW
ExitProcess
GetSystemTimeAsFileTime
HeapFree
RtlUnwind
HeapAlloc
DecodePointer
EncodePointer
MultiByteToWideChar
InterlockedCompareExchange
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleW
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CloseHandle
CreateThread
InitializeCriticalSection
SwitchToThread
FindClose
FindNextFileW
FindFirstFileW
GetLastError
GetModuleFileNameW
WriteFile
LoadLibraryW
SetThreadErrorMode
GetProcAddress
FreeLibrary
InterlockedIncrement
GetCurrentProcessId
InterlockedDecrement
LocalFree
SetEndOfFile
CreateFileW
WriteConsoleW
CreateFileA
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetCurrentThreadId
GetStdHandle
HeapCreate
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
GetProcessHeap
GetStringTypeW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
WideCharToMultiByte
RaiseException
LoadLibraryA
InterlockedExchange
LocalAlloc
GetStartupInfoW
SetFilePointer
IsProcessorFeaturePresent
GetLocaleInfoW
TlsAlloc
GetFileType
user32
DefWindowProcW
MonitorFromWindow
DestroyWindow
PostQuitMessage
GetSystemMetrics
SetWindowPos
SetWindowLongW
AdjustWindowRectEx
GetWindowInfo
LoadCursorW
RegisterClassW
EnumDisplayMonitors
CreateWindowExW
ShowWindow
UpdateWindow
GetWindowLongW
SetWindowTextW
PeekMessageW
TranslateMessage
DispatchMessageW
GetClientRect
IsRectEmpty
GetMonitorInfoW
advapi32
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
ole32
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoInitialize
dxva2
DXVA2CreateDirect3DDeviceManager9
DXVA2CreateVideoService
d3d9
Direct3DCreate9Ex
Sections
.text Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 201.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ