Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_aae40102f4a1c10582e9b76b18e398f7_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_aae40102f4a1c10582e9b76b18e398f7_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_aae40102f4a1c10582e9b76b18e398f7_mafia
-
Size
191KB
-
MD5
aae40102f4a1c10582e9b76b18e398f7
-
SHA1
e802dfd507cd27765e925e20ed54b51c5be0b72c
-
SHA256
0a9d68b29f82b93f57fc6a407fe60de3ddb697059d387fc874a356a758c0efcc
-
SHA512
b5e9806901fd42b527d9f1e7e94e7cdfbb2f708eb77b92e1bda0ddf05ac6899d265b65dabba4f1c214511fb6caafd32753292293dbd48539cf3e93f094502302
-
SSDEEP
3072:jaRkXmZxcmJnCp4IsgC2CyWPVOzOJZJ3vjzZRq2C6y7k82T0vv5b9:ey2ZGmUxCKORBRbC6u2w35
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-17_aae40102f4a1c10582e9b76b18e398f7_mafia
Files
-
2024-02-17_aae40102f4a1c10582e9b76b18e398f7_mafia.exe windows:5 windows x86 arch:x86
80ab950b3571402611b56fa10ddd6f33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
HeapAlloc
SetConsoleTextAttribute
HeapFree
WaitForSingleObject
GetProcessHeap
CreateRemoteThread
WriteFile
OpenProcess
WideCharToMultiByte
GetVolumeInformationA
Sleep
GetConsoleWindow
CreateProcessA
TerminateProcess
SetConsoleTitleA
GetStdHandle
FindFirstFileA
GetProcAddress
CopyFileA
VirtualAllocEx
FindClose
FindNextFileA
GetFullPathNameA
IsDebuggerPresent
GetTempPathA
GetSystemTime
WriteProcessMemory
DeleteFileA
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetExitCodeProcess
SetStdHandle
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetCurrentProcessId
GetComputerNameA
ExitProcess
CloseHandle
GetLastError
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetLocaleInfoW
LoadLibraryW
GetFileAttributesA
FlushFileBuffers
GetConsoleMode
CreateFileA
GetModuleHandleA
GetConsoleCP
SetFilePointer
ReadFile
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetModuleHandleW
WriteConsoleW
GetFileType
GetModuleFileNameW
GetCommandLineA
HeapSetInformation
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
HeapCreate
SetHandleCount
SetEndOfFile
user32
RegisterWindowMessageA
MessageBoxA
LoadIconA
GetWindowRect
DestroyIcon
LoadCursorA
DefWindowProcA
CreateWindowExA
GetSystemMetrics
RegisterClassExA
SetWindowPos
advapi32
GetUserNameA
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyExA
LookupPrivilegeValueA
RegSetValueExA
shell32
ShellExecuteA
Shell_NotifyIconA
wininet
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
InternetOpenA
psapi
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
urlmon
URLDownloadToFileA
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 997KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ