Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_cd869febdc4395c569429381d6a6cf0d_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-01_cd869febdc4395c569429381d6a6cf0d_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-01_cd869febdc4395c569429381d6a6cf0d_mafia
-
Size
945KB
-
MD5
cd869febdc4395c569429381d6a6cf0d
-
SHA1
0b29bbf330598d041aff4cb7ef4f4e70881e6f4f
-
SHA256
e115c14a64bc105e91e00843e90375c6fb4f70c787346aa717464dcc72a91c0d
-
SHA512
0ff05e20535cf60dbca4c16faaf5ffc220c190bf5f39b7ee5a31d58670ce0d2c59290ded1ded730afe2ce2867036de7918a0ffdfdfc0c531cf7c5fbc42424761
-
SSDEEP
24576:v6gdUuMAKFSqF46oti1oZzyzE80ZEpXwSxWv2km:MuA4/i1y18YkwSxWXm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-01_cd869febdc4395c569429381d6a6cf0d_mafia
Files
-
2024-02-01_cd869febdc4395c569429381d6a6cf0d_mafia.exe windows:5 windows x86 arch:x86
b9ea1dbd8dbaaafff70c2c5a8f806cf8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleW
FreeLibrary
LoadLibraryW
SetConsoleCtrlHandler
IsValidLocale
SetStdHandle
SetEndOfFile
CompareStringW
SetEnvironmentVariableA
GetCurrentProcess
GetProcessHeap
HeapAlloc
LocalFree
HeapFree
GetModuleFileNameW
GetTempPathW
MoveFileW
DeleteFileW
GetModuleHandleW
GetProcAddress
CreateEventW
WaitForSingleObject
CreateDirectoryW
CreateFileW
WriteFile
QueueUserWorkItem
GetLastError
InterlockedDecrement
OpenEventW
SetEvent
CloseHandle
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetDriveTypeW
InitializeCriticalSection
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
HeapQueryInformation
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileA
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
SetFilePointer
lstrlenW
SetUnhandledExceptionFilter
CopyFileA
GetCurrentThread
RtlCaptureContext
FormatMessageA
GetCurrentDirectoryA
GetModuleFileNameA
WTSGetActiveConsoleSessionId
OpenProcess
Process32NextW
ProcessIdToSessionId
Process32FirstW
CreateToolhelp32Snapshot
CreateProcessW
MultiByteToWideChar
WideCharToMultiByte
CreateNamedPipeW
LocalAlloc
DisconnectNamedPipe
FlushFileBuffers
TerminateThread
ConnectNamedPipe
CreateThread
GetFileAttributesW
IsWow64Process
GetVersionExW
GetLocaleInfoW
ReadFile
GetFileSize
WaitNamedPipeW
InterlockedIncrement
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
GetCommandLineW
HeapSetInformation
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
GetTimeFormatA
GetDateFormatA
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetTimeZoneInformation
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
HeapDestroy
HeapSize
ExitProcess
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
FatalAppExitA
GetConsoleCP
GetConsoleMode
lstrlenA
user32
wsprintfW
shell32
SHGetFolderPathW
ole32
CLSIDFromProgID
CoCreateGuid
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
CreateErrorInfo
SetErrorInfo
VariantChangeType
GetErrorInfo
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
VariantInit
VariantClear
advapi32
CheckTokenMembership
FreeSid
OpenProcessToken
DuplicateTokenEx
ImpersonateLoggedOnUser
QueryServiceObjectSecurity
GetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetServiceObjectSecurity
ControlService
DeleteService
CreateServiceW
ChangeServiceConfig2W
StartServiceW
QueryServiceStatus
OpenSCManagerW
OpenServiceW
ChangeServiceConfigW
CloseServiceHandle
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RevertToSelf
CreateProcessAsUserW
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertSidToStringSidW
GetTokenInformation
GetLengthSid
CopySid
SetServiceStatus
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
RegOpenKeyExW
rpcrt4
RpcStringFreeW
UuidToStringW
shlwapi
PathFindFileNameW
UrlEscapeW
PathFileExistsW
ws2_32
htonl
dbghelp
SymInitialize
SymCleanup
SymGetLineFromAddr
UnDecorateSymbolName
SymGetSymFromAddr64
SymGetModuleBase
SymFunctionTableAccess
StackWalk
SymSetOptions
psapi
GetProcessMemoryInfo
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wtsapi32
WTSQueryUserToken
Sections
.text Size: 746KB - Virtual size: 745KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ