Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_d50edea17bdf60557494f98083e0d4b3_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_d50edea17bdf60557494f98083e0d4b3_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_d50edea17bdf60557494f98083e0d4b3_mafia
-
Size
1.7MB
-
MD5
d50edea17bdf60557494f98083e0d4b3
-
SHA1
a5a8bf9e25b794cbb5d5832894369712bd13d249
-
SHA256
9e2542ef51ba003b5bbea34f7259bb2432a48029c004f62a2f4d02bc53b3becc
-
SHA512
342a46e6d33ea488d1a38685f2ff06315ed9b3dd70140e1208faa35c7e095811f698611db995f344827838dae969a50ef96a3ecfaaf7be5e401983c7136cdf97
-
SSDEEP
49152:zssd+zKlIe/GcC3YVVY1bAE+cOK6fBP6Gcr+j:IO+cIe/Gv3MBfBSG4m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-24_d50edea17bdf60557494f98083e0d4b3_mafia
Files
-
2024-02-24_d50edea17bdf60557494f98083e0d4b3_mafia.exe windows:5 windows x86 arch:x86
035e9443e2158b890de89490ab28a2b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCreateBitmapFromStreamICM
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipAlloc
GdipCreateBitmapFromStream
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipFree
ntdll
towlower
_wtoi
iswdigit
iswspace
labs
_wcslwr
wcscmp
strstr
strchr
wcsstr
wcsrchr
wcstombs
wcschr
mbstowcs
wcsncat
strrchr
strncmp
ZwFreeVirtualMemory
ZwAllocateVirtualMemory
ZwWriteVirtualMemory
ZwReadVirtualMemory
ZwQueryInformationThread
ZwOpenThread
tolower
ZwOpenKey
wcslen
_wcsnicmp
wcsncmp
ZwClose
ZwQueryInformationProcess
ZwQueryValueKey
memset
wcscpy
RtlQueryRegistryValues
RtlNtStatusToDosError
ZwQuerySystemInformation
memmove
memchr
memcpy
strlen
memcmp
towupper
RtlUnwind
_chkstk
_snwprintf
_wcsicmp
kernel32
GetStringTypeW
HeapSize
HeapReAlloc
IsProcessorFeaturePresent
CompareStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetProcessHeap
SetEndOfFile
GetConsoleMode
GetConsoleCP
SetStdHandle
SetHandleCount
Sleep
SetFilePointer
GetStdHandle
WriteFile
ExitProcess
FreeEnvironmentStringsW
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
CreateThread
ResumeThread
ExitThread
GetFileType
ReadFile
HeapAlloc
HeapFree
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetVersionExW
GetLastError
OpenProcess
CloseHandle
FreeLibrary
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
LockResource
SizeofResource
FindResourceA
VirtualFree
VirtualAlloc
GetModuleHandleW
GetCurrentProcessId
lstrlenW
GetFileTime
CreateFileW
WaitForSingleObject
SetEvent
TerminateThread
DeleteCriticalSection
FindCloseChangeNotification
ResetEvent
FindNextChangeNotification
WaitForMultipleObjects
LeaveCriticalSection
FindFirstChangeNotificationW
EnterCriticalSection
CreateEventW
InitializeCriticalSection
GetFullPathNameW
MultiByteToWideChar
FindNextFileW
FindClose
SetLastError
FindFirstFileW
lstrlenA
GetFileAttributesW
QueryPerformanceCounter
GetTickCount
QueryPerformanceFrequency
GetFileSizeEx
DebugBreak
OutputDebugStringW
GetTimeFormatW
GetDateFormatW
WideCharToMultiByte
GetShortPathNameW
RaiseException
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
GetProcAddress
lstrcmpiW
FindResourceW
LoadLibraryExW
GetModuleFileNameW
FlushFileBuffers
GetLocaleInfoW
GetThreadLocale
WritePrivateProfileStringW
CopyFileW
CreateDirectoryW
GetPrivateProfileStringW
GetCommandLineW
ExpandEnvironmentStringsW
SetFileTime
CreateProcessW
LoadLibraryW
WriteConsoleW
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadResource
CreateMutexW
user32
EqualRect
MessageBoxW
DestroyWindow
GetWindowTextW
MonitorFromWindow
GetWindowRect
GetSystemMetrics
InflateRect
CharLowerW
LoadStringW
PostMessageW
EnumDisplayMonitors
GetMonitorInfoW
IntersectRect
IsRectEmpty
CopyRect
DefWindowProcW
EnumWindows
CharNextW
SendMessageTimeoutW
advapi32
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegQueryValueExW
shell32
ShellExecuteW
SHGetFolderPathW
SHFileOperationW
ole32
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoInitialize
oleaut32
VarUI4FromStr
shlwapi
StrCmpLogicalW
comctl32
InitCommonControlsEx
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ