Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_be8d1d4b223736f8cf9a3d481e336df0_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_be8d1d4b223736f8cf9a3d481e336df0_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_be8d1d4b223736f8cf9a3d481e336df0_mafia
-
Size
2.6MB
-
MD5
be8d1d4b223736f8cf9a3d481e336df0
-
SHA1
bebed25b1609f136a10a36e252548465b878b845
-
SHA256
e1e596f881a6d5e87f99f3beb066ddea311a8c689c9b595ae754fc8032a4be83
-
SHA512
2648b03b0a373a3d6b5ef2379071af52044e2c7c3c279b57529ca67ac7a1a9fdf584fe72849b5ba87bbb6f649449bf2b174d36919821ffc80f6b96db5ac20420
-
SSDEEP
49152:UTvRvaO38G5tE/runXSCHtZ8Aodurphzf3Sudsz5MMBfu:UFaO38+tEDunXXLZodw/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-13_be8d1d4b223736f8cf9a3d481e336df0_mafia
Files
-
2024-02-13_be8d1d4b223736f8cf9a3d481e336df0_mafia.exe windows:5 windows x86 arch:x86
82df99897be23d437574d00f22c52783
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
CreateDirectoryA
CloseHandle
SetFileTime
WriteFile
GetTimeFormatA
FormatMessageA
CreateFileA
SetFilePointer
LoadLibraryA
FreeLibrary
GetFileAttributesA
GetProcAddress
LocalFree
AreFileApisANSI
GetModuleHandleA
CreateDirectoryW
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
RaiseException
GetLastError
HeapFree
GetSystemTimeAsFileTime
SetEnvironmentVariableA
SetCurrentDirectoryA
GetDriveTypeW
GetFullPathNameA
DeleteFileA
GetModuleHandleW
ExitProcess
HeapAlloc
GetCommandLineA
HeapSetInformation
GetCPInfo
LCMapStringW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLocaleInfoW
LoadLibraryW
IsProcessorFeaturePresent
HeapCreate
HeapSize
GetCurrentDirectoryW
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetStartupInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetStdHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
CreateFileW
CompareStringW
SetEndOfFile
GetProcessHeap
DeviceIoControl
GetFileAttributesW
GetDateFormatA
user32
wsprintfA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
CLSIDFromProgID
oleaut32
SysAllocString
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 355KB - Virtual size: 355KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 472KB - Virtual size: 471KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ