Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_50d7e1f393a3fdd4b7aba25212e54ffd_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-02_50d7e1f393a3fdd4b7aba25212e54ffd_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-02_50d7e1f393a3fdd4b7aba25212e54ffd_mafia
-
Size
184KB
-
MD5
50d7e1f393a3fdd4b7aba25212e54ffd
-
SHA1
77779909798abb74cf5a36fe097392a43ca66174
-
SHA256
37d7cc699bcdde62becea24f53bcd98b9f1ca74f6be3083644883aeb02c5d32e
-
SHA512
dca0d15c98480fc46ec3d2c260c38f72e24d5cf1da3d13addf22d2d55ecc9b2dcc94895657d8f6d63f014ba875fe28661ba80c8e2bef95747f07956970486c16
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3S:/7BSH8zUB+nGESaaRvoB7FJNndnL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-02_50d7e1f393a3fdd4b7aba25212e54ffd_mafia
Files
-
2024-02-02_50d7e1f393a3fdd4b7aba25212e54ffd_mafia.exe windows:5 windows x86 arch:x86
be3154a7cc7ab2b0631b9c25c67b9da0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetTempFileNameW
WaitForSingleObject
Sleep
GetFileAttributesW
lstrlenW
GetTempPathW
GetLastError
lstrcatW
CloseHandle
DeleteFileW
GetTempPathA
lstrcpyW
lstrcpyA
GetCommandLineW
GetProcAddress
ReadFile
GetModuleFileNameW
CreateFileW
SetEndOfFile
WriteConsoleW
SetStdHandle
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
GetSystemTimeAsFileTime
LoadLibraryW
GetFileSize
FreeLibrary
GetCurrentProcessId
GetTickCount
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
WideCharToMultiByte
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
HeapSize
GetStringTypeW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetProcessHeap
user32
GetMessageA
RegisterClassExA
PostQuitMessage
LoadIconA
MessageBoxA
CreateWindowExA
DefWindowProcA
ShowWindow
DispatchMessageA
LoadCursorA
TranslateMessage
advapi32
RegCloseKey
GetUserNameW
shell32
ShellExecuteExW
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ