Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_9e238d23f52e71380c4c286b3afa3a56_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_9e238d23f52e71380c4c286b3afa3a56_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_9e238d23f52e71380c4c286b3afa3a56_mafia
-
Size
8.0MB
-
MD5
9e238d23f52e71380c4c286b3afa3a56
-
SHA1
bcd4dedf52391e25a57aa0f0c9204df11f722b23
-
SHA256
dcbed75299c73d1fb390d24d1a1fbaad0c34a99e7ba064367aebf7b4c1f526e4
-
SHA512
56f45d23c6c7ad5d8efff794f595e3ffeeaa41ccc1b52a70fc816e74a62b28bac27c3a2e7ca0be9996058b0705de3057246f92bcde9daf6a4485c61cd4ec662e
-
SSDEEP
196608:7GpGZ0SiQm1eKkZtCT2tyDIxc2tFtbkEzkCgJMQIvgZXYqZ/aRm399n+0d5flS:hJ0WtyDIx/FtIovJvHoLS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-19_9e238d23f52e71380c4c286b3afa3a56_mafia
Files
-
2024-02-19_9e238d23f52e71380c4c286b3afa3a56_mafia.exe windows:5 windows x86 arch:x86
813a2040fd8e2ba374447e3bbd2717fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHAppBarMessage
SHGetSpecialFolderLocation
SHGetDesktopFolder
DragQueryFileA
DragFinish
SHGetFileInfoA
SHGetFolderPathA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
kernel32
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetStartupInfoW
HeapCreate
GetSystemInfo
IsValidCodePage
LCMapStringW
GetLocaleInfoW
FreeEnvironmentStringsW
HeapSize
QueryPerformanceCounter
GetStringTypeW
GetTimeZoneInformation
GetDriveTypeW
CompareStringW
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
GetCurrentDirectoryW
CreateFileW
GetProcessHeap
SetEnvironmentVariableA
VirtualAlloc
RaiseException
SetConsoleMode
ReadConsoleInputA
HeapQueryInformation
ExitThread
GetEnvironmentStringsW
VirtualQuery
Sleep
SetThreadExecutionState
GetLastError
CreateMutexA
RtlUnwind
HeapReAlloc
HeapSetInformation
GetCommandLineA
HeapAlloc
HeapFree
DecodePointer
EncodePointer
FindResourceExW
GetUserDefaultLCID
VirtualProtect
SearchPathA
GetProfileIntA
GetTickCount
GetNumberFormatA
GetFileTime
GetFileSizeEx
GetFileAttributesExA
GetTempFileNameA
GetOEMCP
GetCPInfo
GetFileAttributesA
GetACP
GetFullPathNameA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
lstrcmpiA
lstrcpyA
GetSystemDirectoryW
GlobalFlags
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
SetErrorMode
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileA
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalFindAtomA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryW
lstrcmpW
GetModuleFileNameW
ReleaseActCtx
CreateActCtxW
FindResourceA
FreeResource
ResumeThread
DeleteFileA
SetConsoleCtrlHandler
FreeLibrary
SetThreadPriority
GlobalAddAtomA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
GetUserDefaultUILanguage
ConvertDefaultLocale
GetSystemDefaultUILanguage
GetLocaleInfoA
LoadLibraryExA
CompareStringA
lstrcmpA
GetModuleHandleW
InterlockedExchange
GlobalFree
CopyFileA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrlenW
MulDiv
GetCurrentProcessId
ActivateActCtx
DeactivateActCtx
SetLastError
MultiByteToWideChar
lstrlenA
RemoveDirectoryA
SetCurrentDirectoryA
SetVolumeMountPointA
GetLogicalDrives
FindVolumeClose
InterlockedDecrement
FindNextVolumeA
GetSystemFirmwareTable
GetDiskFreeSpaceExA
FindFirstVolumeA
GetVolumePathNamesForVolumeNameA
CreateDirectoryA
CreateProcessA
GetVolumeInformationA
GetDriveTypeA
WaitForSingleObject
SetVolumeLabelA
LockResource
SizeofResource
GetFirmwareEnvironmentVariableA
WideCharToMultiByte
DeleteVolumeMountPointA
LoadResource
FindResourceW
ExitProcess
GetSystemPowerStatus
ReadFile
WriteFile
CreateNamedPipeA
LocalFree
CreateThread
GetSystemDirectoryA
GetWindowsDirectoryA
DeviceIoControl
CloseHandle
CreateFileA
GetModuleHandleA
GetModuleFileNameA
GetTempPathA
GetCurrentDirectoryA
GetVersionExA
LoadLibraryA
GetProcAddress
GetCurrentProcess
user32
DestroyCursor
MapDialogRect
SubtractRect
MapVirtualKeyExA
IsCharLowerA
CharUpperBuffA
GetUpdateRect
FrameRect
IsClipboardFormatAvailable
PostThreadMessageA
CreateMenu
TranslateMDISysAccel
DrawMenuBar
DefMDIChildProcA
DefFrameProcA
RegisterClipboardFormatA
GetDoubleClickTime
CopyIcon
SetMenuDefaultItem
HideCaret
InvertRect
GetMenuDefaultItem
UnpackDDElParam
ReuseDDElParam
LoadMenuA
LoadAcceleratorsA
InsertMenuItemA
TranslateAcceleratorA
LockWindowUpdate
BringWindowToTop
SetCursorPos
SetRect
CreateAcceleratorTableA
LoadAcceleratorsW
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
CopyAcceleratorTableA
MessageBeep
LoadMenuW
SetClassLongA
NotifyWinEvent
CreatePopupMenu
DestroyAcceleratorTable
SetParent
IsZoomed
GetMenuItemInfoA
IsMenu
GetAsyncKeyState
DestroyMenu
MonitorFromPoint
UpdateLayeredWindow
EnableScrollBar
UnionRect
SetWindowRgn
DrawFrameControl
DrawEdge
LoadImageW
EmptyClipboard
CloseClipboard
SetClipboardData
OpenClipboard
DrawStateA
IntersectRect
CharUpperA
WaitMessage
WindowFromPoint
LoadCursorW
SetLayeredWindowAttributes
EnumDisplayMonitors
DeleteMenu
RealChildWindowFromPoint
LoadCursorA
GetSysColorBrush
UnregisterClassA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetDlgItemTextA
CheckDlgButton
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetForegroundWindow
ShowScrollBar
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetWindowRect
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetWindowPlacement
GetDlgCtrlID
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
UnhookWindowsHookEx
LoadIconA
ReleaseCapture
LoadImageA
GetIconInfo
CopyImage
DrawIconEx
DestroyIcon
MessageBoxA
wsprintfA
SystemParametersInfoA
BlockInput
ExitWindowsEx
GetNextDlgGroupItem
SetCapture
InvalidateRect
DrawFocusRect
OffsetRect
InflateRect
SetRectEmpty
PtInRect
IsRectEmpty
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
GetWindowTextLengthA
GetWindowTextA
GetScrollPos
SetScrollPos
GetWindow
SetFocus
MapVirtualKeyA
GetKeyNameTextA
ReleaseDC
GetDC
CopyRect
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
GetWindowRgn
RegisterWindowMessageA
RegisterClassExA
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
EnableWindow
UpdateWindow
GetSystemMetrics
PostMessageA
GetDesktopWindow
RedrawWindow
PeekMessageA
LoadIconW
SendMessageA
GetClientRect
DrawIcon
KillTimer
IsIconic
PostQuitMessage
SetTimer
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
GetWindowThreadProcessId
RemoveMenu
GetSubMenu
GetMenuItemCount
InsertMenuA
GetMenuItemID
AppendMenuA
GetMenuStringA
GetMenuState
CheckMenuItem
EnableMenuItem
ModifyMenuA
GetFocus
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
SetCursor
ShowOwnedPopups
ValidateRect
GetCursorPos
GetKeyState
IsWindowVisible
GetActiveWindow
CallNextHookEx
SetWindowsHookExA
EndDialog
GetSystemMenu
gdi32
GetTextCharsetInfo
SetRectRgn
CombineRgn
DPtoLP
SetDIBColorTable
RealizePalette
StretchBlt
SetPixel
CreateDIBSection
CreateEllipticRgn
CreatePolygonRgn
GetBkColor
GetTextColor
Polyline
Ellipse
Polygon
Rectangle
CreateRoundRectRgn
CreatePalette
GetPaletteEntries
GetNearestPaletteIndex
GetSystemPaletteEntries
OffsetRgn
GetRgnBox
EnumFontFamiliesA
EnumFontFamiliesExA
LPtoDP
GetWindowOrgEx
GetViewportOrgEx
PtInRegion
FillRgn
FrameRgn
GetBoundsRect
ExtFloodFill
SetPaletteEntries
GetTextFaceA
SetPixelV
CreateCompatibleBitmap
GetTextMetricsA
CreateFontIndirectA
CreateDIBitmap
GetTextExtentPoint32A
CreateHatchBrush
CreateSolidBrush
CreatePen
GetObjectType
SelectPalette
GetStockObject
CreateCompatibleDC
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
RestoreDC
SaveDC
PatBlt
CreateRectRgnIndirect
CreateBitmap
CreateDCA
CopyMetaFileA
GetDeviceCaps
CreateFontA
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
GetObjectA
CreateRectRgn
SelectClipRgn
DeleteObject
SetLayout
GetLayout
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
msimg32
TransparentBlt
AlphaBlend
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteKeyA
CreateServiceA
StartServiceA
OpenServiceA
ControlService
DeleteService
OpenSCManagerA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegEnumKeyExA
RegEnumValueA
RegQueryValueA
RegEnumKeyA
CloseServiceHandle
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
comctl32
InitCommonControlsEx
ImageList_GetIconSize
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathRemoveFileSpecW
ole32
OleGetClipboard
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
DoDragDrop
OleLockRunning
IsAccelerator
OleTranslateAccelerator
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
CoInitialize
CoCreateGuid
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
SysAllocString
VariantClear
SafeArrayDestroy
SafeArrayCreate
VariantInit
SafeArrayGetElement
SafeArrayPutElement
SysFreeString
SysAllocStringLen
VariantChangeType
VariantTimeToSystemTime
SystemTimeToVariantTime
SysStringLen
VarBstrFromDate
gdiplus
GdipSetInterpolationMode
GdipCreateFromHDC
GdipCreateBitmapFromHBITMAP
GdipCloneImage
GdipDrawImageI
GdipGetImageGraphicsContext
GdiplusShutdown
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipDrawImageRectI
oleacc
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
imm32
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
winmm
PlaySoundA
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ