?CurrentKind@btkEvent@@1HA
?PRO_MACHINE_TYPE@@3PBDB
?PRO_OS_TYPE@@3PBDB
?StdStream@btkProcess@@2VDefaultStream@1@A
?mbsMode@btkMBStrFunc@@0PAVbtkOBSFunc@@A
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_46235c327c5bf54c9f0e66655c8e0a39_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_46235c327c5bf54c9f0e66655c8e0a39_mafia.exe
Resource
win10v2004-20240221-en
Target
2024-02-24_46235c327c5bf54c9f0e66655c8e0a39_mafia
Size
2.8MB
MD5
46235c327c5bf54c9f0e66655c8e0a39
SHA1
483ffd15663e4418ad5be5d3287d9afe299465ce
SHA256
967b4e2802f25797c99f60bd8d38828297dfb879b63a94d7ac8c8eb26d6e1dea
SHA512
d06509ca5597eae27aa5defe310c44234d4fbb2ac130a90836b4c491a932dc98e6e888b1a4930843eb6260af215a3ba069a6a6ad22cae64b3d7110537abba957
SSDEEP
49152:KfZBKQeATpqo7USeiY5Hhys6dPxDn30/Ud53QfjCFa1qoyRutEIR0ZHz2BzJ+tPP:MBKQeATpqo7USeiY5Hhys6dPxDn30/Ul
Checks for missing Authenticode signature.
resource |
---|
2024-02-24_46235c327c5bf54c9f0e66655c8e0a39_mafia |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameW
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleA
GetVersionExW
GetVolumeInformationW
LoadLibraryW
LoadLibraryA
OutputDebugStringW
OutputDebugStringA
SetWaitableTimer
CreateWaitableTimerA
ResetEvent
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
SetLastError
InitializeCriticalSection
DeleteCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
ReleaseSemaphore
ResumeThread
DuplicateHandle
SystemTimeToFileTime
VirtualQuery
GetCurrentDirectoryW
InitializeCriticalSectionAndSpinCount
UnmapViewOfFile
GetFileAttributesW
FindClose
GenerateConsoleCtrlEvent
GetFileSize
UnlockFile
ReadProcessMemory
GetFileAttributesA
GetCurrentDirectoryA
GetThreadContext
SuspendThread
Thread32Next
OpenThread
Thread32First
CreateToolhelp32Snapshot
CopyFileW
CopyFileExW
CreateDirectoryW
CreateDirectoryExW
CreateFileW
CreateProcessW
DeleteFileW
ExpandEnvironmentStringsW
FindFirstFileW
FindNextFileW
GetComputerNameW
GetFullPathNameW
GetTempFileNameW
MoveFileW
RemoveDirectoryW
SetCurrentDirectoryW
SetFileAttributesW
SetVolumeLabelW
SetHandleInformation
CopyFileA
CopyFileExA
CreateDirectoryA
CreateDirectoryExA
CreateProcessA
DeleteFileA
ExpandEnvironmentStringsA
FindFirstFileA
FindNextFileA
GetComputerNameA
GetFileTime
GetSystemTimeAsFileTime
GetSystemTime
GetFullPathNameA
GetTempFileNameA
MoveFileA
MoveFileExA
RemoveDirectoryA
SetCurrentDirectoryA
SetFileAttributesA
SetVolumeLabelA
HeapAlloc
HeapFree
HeapReAlloc
HeapCreate
GetWindowsDirectoryA
GetVersion
GetTickCount
VirtualAlloc
VirtualFree
GetPrivateProfileStringA
GetPrivateProfileIntA
GetLocalTime
SearchPathA
OpenSemaphoreA
lstrlenA
MapViewOfFile
GetThreadLocale
InterlockedCompareExchange
CompareStringW
GetFileInformationByHandle
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
InterlockedExchange
HeapSize
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
SetHandleCount
SetEnvironmentVariableA
GetDateFormatA
GetTimeFormatA
GetTimeZoneInformation
FindFirstFileExA
LocalFileTimeToFileTime
SetFileTime
GetStringTypeW
GetDateFormatW
GetTimeFormatW
FindFirstFileExW
SetEnvironmentVariableW
GetFileType
GetProcessHeap
GetCPInfo
RtlUnwind
GetConsoleCP
InterlockedIncrement
ExitProcess
EncodePointer
DecodePointer
HeapSetInformation
GetEnvironmentVariableA
GetEnvironmentVariableW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetDriveTypeW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetCommandLineA
GetCommandLineW
DefineDosDeviceW
CreateSemaphoreA
CreateMutexA
CreateFileMappingA
CreateEventA
CreateEventW
GetCurrentThread
CompareFileTime
SetEndOfFile
FindFirstChangeNotificationW
GetLogicalDrives
FindCloseChangeNotification
FileTimeToLocalFileTime
FileTimeToSystemTime
OpenProcess
TerminateProcess
ExitThread
GetDriveTypeA
InterlockedDecrement
DeviceIoControl
GetVersionExA
DefineDosDeviceA
CreateFileA
GetVolumeInformationA
GetProcessTimes
GetCurrentProcess
SetStdHandle
GetSystemInfo
GetCurrentThreadId
GetExitCodeProcess
RaiseException
IsDBCSLeadByteEx
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLangID
GlobalMemoryStatusEx
GetStdHandle
GetConsoleMode
SetErrorMode
GetProcAddress
FreeLibrary
SetEvent
CreateThread
Sleep
LocalAlloc
LocalFree
ReleaseMutex
CloseHandle
PeekNamedPipe
WaitForSingleObject
WriteFile
SetFilePointer
GetLastError
ReadFile
FlushFileBuffers
CreatePipe
IsDebuggerPresent
GetCurrentProcessId
MoveFileExW
NetApiBufferFree
Netbios
NetRemoteTOD
ntohs
WSACleanup
WSAStartup
getprotobyname
inet_addr
inet_ntoa
select
getpeername
getsockname
ioctlsocket
setsockopt
getsockopt
shutdown
closesocket
listen
accept
connect
recvfrom
recv
sendto
send
bind
socket
__WSAFDIsSet
getnameinfo
freeaddrinfo
getaddrinfo
gethostbyaddr
gethostbyname
htonl
htons
ntohl
WSAGetLastError
gethostname
GetWindowLongA
SendMessageA
GetDlgItem
GetWindowRect
EnableWindow
GetActiveWindow
PeekMessageA
TranslateMessage
MsgWaitForMultipleObjects
SetWindowTextA
MessageBeep
SetDlgItemTextA
MessageBoxA
GetDlgItemTextW
GetDlgItemTextA
EndDialog
GetClientRect
GetSystemMetrics
GetParent
GetFocus
SetFocus
MoveWindow
ScreenToClient
DispatchMessageA
ShowWindow
wsprintfA
CreateDialogIndirectParamA
DialogBoxIndirectParamA
ord17
GetOpenFileNameA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegConnectRegistryA
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegConnectRegistryW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
GetFileSecurityW
SetFileSecurityW
RevertToSelf
AccessCheck
OpenThreadToken
ImpersonateSelf
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetUserNameW
GetUserNameA
LookupAccountNameW
LookupAccountNameA
LookupAccountSidW
LookupAccountSidA
WNetGetConnectionA
WNetCloseEnum
WNetEnumResourceA
WNetOpenEnumA
GetProcessImageFileNameW
EnumProcessModules
GetModuleInformation
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
SysAllocString
VariantClear
SysFreeString
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
?CurrentKind@btkEvent@@1HA
?PRO_MACHINE_TYPE@@3PBDB
?PRO_OS_TYPE@@3PBDB
?StdStream@btkProcess@@2VDefaultStream@1@A
?mbsMode@btkMBStrFunc@@0PAVbtkOBSFunc@@A
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ