Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_88609a76211d5e18f029a6ee4b84bd99_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_88609a76211d5e18f029a6ee4b84bd99_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-18_88609a76211d5e18f029a6ee4b84bd99_mafia
-
Size
703KB
-
MD5
88609a76211d5e18f029a6ee4b84bd99
-
SHA1
e4267e28f4532e0bfd330d24151e0008e1a7820d
-
SHA256
0774361495852f044e12848010c9a7e99758ba6d2794bf2eab65886445d74204
-
SHA512
70153d09b1080d9dc05353c47a74369b0d8f9d4d4f74c1764ded026f0b83b59ace711fd82a9ddd18f89ef43959ad316d0a14f77a0a9387dd2bcb5142030a58d2
-
SSDEEP
12288:xhf6Qc6Y+3l9iLlg0cfC0igesXq4cQmmTsG0OzSDWeVJedx9wTbT:xhfDc6X3lQMrUr4cQFTj0OZeVJmx92bT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-18_88609a76211d5e18f029a6ee4b84bd99_mafia
Files
-
2024-02-18_88609a76211d5e18f029a6ee4b84bd99_mafia.exe windows:5 windows x86 arch:x86
786d492994809809a8824667c8485518
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
IIDFromString
StringFromGUID2
OleRun
CLSIDFromString
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoTaskMemRealloc
CoUninitialize
CoCreateInstance
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetFolderPathW
wininet
InternetTimeFromSystemTime
InternetTimeToSystemTime
InternetCrackUrlA
HttpQueryInfoA
InternetConnectA
InternetReadFile
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
InternetOpenA
InternetCloseHandle
user32
GetDesktopWindow
SetWindowLongA
CreateWindowExA
PeekMessageA
GetWindowLongA
CharNextA
wsprintfA
DispatchMessageW
RegisterClassA
LoadImageA
GetSystemMetrics
DispatchMessageA
PostMessageA
AppendMenuA
CreatePopupMenu
ShowWindow
MsgWaitForMultipleObjectsEx
GetCursorPos
DefWindowProcA
MessageBoxA
DestroyWindow
GetMessageA
GetMessageW
PostQuitMessage
TrackPopupMenu
SetForegroundWindow
LoadStringA
TranslateMessage
IsWindowUnicode
version
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
GetFullPathNameW
CreateDirectoryW
GetConsoleMode
GetConsoleCP
GetFileType
GetStartupInfoW
HeapSetInformation
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
HeapAlloc
HeapFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
SetStdHandle
HeapReAlloc
RtlUnwind
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
GetTimeZoneInformation
HeapCreate
FindResourceA
lstrcmpA
lstrlenA
FreeLibrary
LoadResource
SystemTimeToTzSpecificLocalTime
InterlockedIncrement
InterlockedDecrement
WaitForSingleObject
GetCommandLineA
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
CreateEventA
SetDllDirectoryA
IsDBCSLeadByte
lstrcatA
MultiByteToWideChar
lstrlenW
RaiseException
GetLastError
lstrcmpiA
GetProcAddress
WaitForMultipleObjects
GetModuleFileNameA
GetStdHandle
LoadLibraryExA
CreateMutexA
DeleteCriticalSection
CloseHandle
SetEvent
ResetEvent
CreateThread
lstrcpyA
lstrcpynA
CreateFileA
WriteFile
Sleep
OpenEventA
GetCurrentProcess
GetVersionExA
GetTempPathA
LocalFree
DeleteFileA
ReadFile
FileTimeToSystemTime
FormatMessageW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
PeekNamedPipe
SetHandleInformation
GetExitCodeProcess
CreateProcessA
TerminateProcess
CreatePipe
ExitProcess
GetLocaleInfoA
FormatMessageA
GetSystemDirectoryA
FindClose
LoadLibraryA
LocalAlloc
LockResource
SetEndOfFile
SetFilePointerEx
GetNativeSystemInfo
GetModuleHandleExW
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetTickCount
GetModuleFileNameW
SetLastError
LoadLibraryExW
OpenMutexA
GetModuleHandleExA
LoadLibraryW
CreateFileW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLocaleInfoW
SetHandleCount
SetFilePointer
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetProcessHeap
WriteConsoleW
GetCurrentDirectoryW
GetFileInformationByHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CompareStringW
SetEnvironmentVariableA
GetModuleHandleA
GetFileAttributesA
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyA
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
RegQueryValueExA
CryptGetHashParam
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegNotifyChangeKeyValue
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyW
RegSetValueExA
oleaut32
GetErrorInfo
SysStringByteLen
VarUI4FromStr
SysFreeString
SysAllocString
VariantClear
VariantInit
VariantChangeType
shlwapi
ord12
gdi32
GetStockObject
crypt32
CryptStringToBinaryA
CryptUnprotectData
CryptProtectData
CryptBinaryToStringA
msi
ord141
ord168
ord160
ord158
ord115
ord159
ord117
ord8
ord44
ord204
ord189
ord67
ord31
ord137
ord91
Sections
.text Size: 368KB - Virtual size: 367KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 105KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE