Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_eaadd45b0a33ef35c0b8b7cf0cd38cda_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_eaadd45b0a33ef35c0b8b7cf0cd38cda_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_eaadd45b0a33ef35c0b8b7cf0cd38cda_mafia
-
Size
1.7MB
-
MD5
eaadd45b0a33ef35c0b8b7cf0cd38cda
-
SHA1
e38463864dc675bda0e172165aba4e7a3fd06a16
-
SHA256
1bb928248f7ead96cd799b05024d7f8ea22930bbbd6cc50f6dd32dd7352cfd61
-
SHA512
2ad8bd77a0b414fcb5739ab0cabf1460f4c64d1431327ee84043bed361bee308c8529cdb4dda16c8191e6b5d309a5ab16e465ac39a277cd433bbf154e6077336
-
SSDEEP
49152:iPdAso04gTsGR9RTKox2d30pX52ZMhFb9/OS:6Y04g1p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-18_eaadd45b0a33ef35c0b8b7cf0cd38cda_mafia
Files
-
2024-02-18_eaadd45b0a33ef35c0b8b7cf0cd38cda_mafia.exe windows:5 windows x86 arch:x86
01ee2689234de868a665baea2a6cb66a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileW
FindFirstFileA
FindNextFileW
FindNextFileA
FindClose
Sleep
ResetEvent
CreateEventA
SetEvent
GetVolumeInformationA
GetDriveTypeA
VirtualAlloc
VirtualFree
GetSystemWindowsDirectoryA
SetLastError
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
InitializeCriticalSection
DeleteCriticalSection
DeviceIoControl
CreateFileA
SetNamedPipeHandleState
WaitNamedPipeA
SleepEx
WriteFile
ReadFile
GetFileAttributesA
HeapFree
DeleteFileA
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
RtlUnwind
HeapReAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
GetFileType
CreateFileW
GetDriveTypeW
FindFirstFileExW
MoveFileA
MoveFileW
GetFileAttributesW
DeleteFileW
GetModuleHandleW
ExitProcess
DecodePointer
ExitThread
ResumeThread
CreateThread
EncodePointer
InterlockedExchange
LoadLibraryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
HeapCreate
HeapDestroy
GetStdHandle
GetModuleFileNameW
SetHandleCount
FormatMessageA
SetFilePointer
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlushFileBuffers
LCMapStringW
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
SetCurrentDirectoryW
SetStdHandle
SetEndOfFile
GetProcessHeap
GetFullPathNameW
SetConsoleCtrlHandler
GetLocaleInfoW
SetEnvironmentVariableW
SetEnvironmentVariableA
HeapSize
CompareStringW
WriteConsoleW
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetProcessTimes
GetTickCount
CreateMutexA
GetLastError
CreateDirectoryW
GetDateFormatA
GetTimeFormatA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
UnlockFile
LockFile
OpenProcess
ReleaseSemaphore
CreateSemaphoreA
SetConsoleTitleA
WaitForSingleObject
ReleaseMutex
CloseHandle
SetHandleInformation
SetErrorMode
GetEnvironmentVariableW
GetEnvironmentVariableA
GetCommandLineW
WideCharToMultiByte
MultiByteToWideChar
GetVersion
GetWindowsDirectoryA
GetEnvironmentStrings
GetLocalTime
GetTimeZoneInformation
GetStartupInfoW
GetModuleHandleA
lstrlenA
FreeEnvironmentStringsA
GetVersionExA
LoadLibraryA
GetProcAddress
FatalAppExitA
FreeLibrary
user32
GetWindowRect
GetDlgItem
SendMessageA
MessageBeep
GetActiveWindow
SetDlgItemTextA
GetDlgItemTextW
GetDlgItemTextA
EndDialog
GetParent
GetFocus
SetFocus
EnableWindow
GetWindowLongA
SetWindowTextA
ShowWindow
MoveWindow
ScreenToClient
GetClientRect
wsprintfA
CreateDialogIndirectParamA
MessageBoxA
GetSystemMetrics
DialogBoxIndirectParamA
netapi32
Netbios
userenv
GetProfilesDirectoryA
comdlg32
GetOpenFileNameA
comctl32
ord17
wsock32
connect
__WSAFDIsSet
ioctlsocket
inet_addr
WSAGetLastError
closesocket
getsockopt
select
recv
send
inet_ntoa
socket
setsockopt
getprotobyname
WSAStartup
htons
WSACleanup
htonl
shell32
ord680
oleaut32
SysAllocStringLen
SysStringLen
VariantInit
VariantClear
SysAllocString
SysFreeString
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
ws2_32
getaddrinfo
getnameinfo
freeaddrinfo
advapi32
ReportEventA
RegDeleteValueA
RegEnumValueA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
GetUserNameA
GetUserNameW
RegEnumKeyExA
RegQueryInfoKeyA
CloseServiceHandle
QueryServiceStatus
OpenServiceA
OpenSCManagerA
StartServiceA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegisterEventSourceA
DeregisterEventSource
RegCloseKey
shlwapi
PathRemoveBackslashW
dhcpcsvc
DhcpRequestParams
psapi
GetProcessMemoryInfo
Sections
.text Size: 506KB - Virtual size: 506KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textidx Size: 956KB - Virtual size: 955KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ