Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_4c9bf29b6b08926fd94e2136b6749dcf_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_4c9bf29b6b08926fd94e2136b6749dcf_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_4c9bf29b6b08926fd94e2136b6749dcf_mafia
-
Size
725KB
-
MD5
4c9bf29b6b08926fd94e2136b6749dcf
-
SHA1
895b0d94f5e1e50dbec69a7517b0d2e0faaf65d9
-
SHA256
9b828b27b3d4eef221964536ab86a74dd5d0f7b1414a8975762a978c94916c99
-
SHA512
3a839d03f5549875fb3c89ed9b9788f343bdbf95dbe96b91ba6cb7ccb64aa5ef214ed05ae8d9422308802d6d2c94656fda2b84129fcc63cec7d84fe928cc0316
-
SSDEEP
12288:C8/3xuAcrOH1pQErZEzNhNlp0YVKw69i1R3P1KO5K/D8xHHqb8dorATb5jO5F+Ix:C8kAFGFVn11dK78xHHqbw31OnJG9Ut
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-06_4c9bf29b6b08926fd94e2136b6749dcf_mafia
Files
-
2024-03-06_4c9bf29b6b08926fd94e2136b6749dcf_mafia.exe windows:5 windows x86 arch:x86
c555f18bbe171bc8c0fce8a648410aba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
lz32
LZOpenFileA
LZCopy
LZClose
user32
GetDialogBaseUnits
KillTimer
GetClassInfoA
RegisterClassA
LoadCursorA
RegisterWindowMessageA
MsgWaitForMultipleObjects
PeekMessageA
GetMessageA
TranslateMDISysAccel
TranslateMessage
DispatchMessageA
CharNextA
MessageBoxA
CharUpperA
wsprintfA
WaitMessage
SetTimer
GetWindowPlacement
PostQuitMessage
GetSysColor
CopyRect
IntersectRect
GetKeyState
ScrollWindowEx
FlashWindow
SetPropA
CreateWindowExA
GetWindowDC
RemovePropA
GetDesktopWindow
UpdateWindow
SetForegroundWindow
DefFrameProcA
DefMDIChildProcA
DefWindowProcA
CallWindowProcA
BeginPaint
EndPaint
GetPropA
SetWindowTextA
SetWindowPos
LoadImageA
ShowWindow
SetLayeredWindowAttributes
EnableWindow
InvalidateRect
GetWindowRect
SetRectEmpty
DrawEdge
InflateRect
DrawTextA
GetFocus
IsWindowVisible
SetFocus
GetWindowLongA
IsWindowEnabled
GetWindow
GetParent
SetWindowLongA
SetParent
DestroyIcon
GetDC
ReleaseDC
ScreenToClient
IsRectEmpty
GetClientRect
ClipCursor
ClientToScreen
IsWindow
GetClassNameA
SendMessageA
GetWindowTextLengthA
GetWindowTextA
CharLowerA
gdi32
MoveToEx
LineTo
Rectangle
CreatePatternBrush
CreateSolidBrush
CreateFontIndirectA
GetTextMetricsA
CreateRectRgnIndirect
SetBkColor
GetTextExtentPoint32A
SetBkMode
SetTextColor
SetBrushOrgEx
PatBlt
StretchDIBits
CreateCompatibleDC
GetObjectA
SelectObject
StretchBlt
BitBlt
DeleteObject
CreatePen
CreateICA
GetDeviceCaps
DeleteDC
GetStockObject
comctl32
InitializeFlatSB
FlatSB_SetScrollProp
InitCommonControlsEx
ImageList_Add
ImageList_Create
_TrackMouseEvent
ImageList_GetIcon
ImageList_Duplicate
FlatSB_SetScrollRange
FlatSB_SetScrollPos
FlatSB_GetScrollPos
FlatSB_GetScrollRange
ImageList_ReplaceIcon
ImageList_Destroy
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
shell32
CommandLineToArgvW
DragQueryFileA
DragFinish
ExtractIconA
FindExecutableA
DragAcceptFiles
odbc32
ord7
ord76
ord16
ord47
ord30
ord18
ord59
ord12
ord2
ord1
ord39
ord41
ord45
ord50
ord22
ord4
ord40
ord8
ord43
ord72
ord11
ord3
ord17
ord36
ord10
ord29
ord9
ord14
ord15
ord19
zkernel
?zDBGetPKkey@@YGFPAXPBDPAPAU_pkey_@@G@Z
?zGridBrowse@@YG_NPAUHWND__@@PAXPBD2222222222H@Z
?zGridPrepare@@YGPAXPAUHWND__@@PBD@Z
?zGridExec@@YGPAXPAUHWND__@@PBD@Z
?zGridAggregate@@YGNPAUHWND__@@HPBD11_N@Z
?zGridPutLong@@YGXPAUHWND__@@JHJ@Z
?zDBError@@YGXPAX00PBD@Z
?zKernelInit@@YGXXZ
?zGridGetSuffix@@YGPBDPAUHWND__@@H@Z
?zGridGetPrefix@@YGPBDPAUHWND__@@H@Z
?zGridPutText@@YGXPAUHWND__@@JHPBD@Z
?zGridGetText@@YGPBDPAUHWND__@@JH_N@Z
?zGridGetCellRect@@YGXPAUHWND__@@JHPAUtagRECT@@@Z
?zDBExecScript@@YGHPAX0PBDFPAD@Z
wsock32
ioctlsocket
ole32
StringFromGUID2
CoCreateGuid
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
shlwapi
StrStrIA
msimg32
GradientFill
gdiplus
GdiplusShutdown
GdiplusStartup
GdipLoadImageFromStream
GdipCloneImage
GdipDrawImageRectI
GdipDrawImageI
GdipCreateFromHDC
GdipCreateBitmapFromStream
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipLoadImageFromStreamICM
uxtheme
DrawThemeBackground
SetWindowTheme
CloseThemeData
OpenThemeData
_dll0
?ZeroContext@@YA_NAAVcZero@@@Z
?VirtuaWinCurrentDesktopNumber@@YAHXZ
?K4@@YA_NPBDPAD0@Z
?ZeroOwner@@YA?AVxstring@@XZ
?ZeroDBcontext@@YA_NAAVzDB@@AAVcZero@@@Z
?SingleInstance@@YA_NAAV?$xsharedmemory@VshMem@@@@HH@Z
kernel32
OpenEventA
GetModuleHandleA
FormatMessageA
LocalFree
GetDateFormatA
FindFirstFileA
FindClose
GetCurrentDirectoryA
GetComputerNameA
WideCharToMultiByte
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
GetProfileIntA
GetProfileStringA
CreateEventA
GetEnvironmentVariableA
lstrlenW
GlobalReAlloc
GlobalHandle
GetDiskFreeSpaceExA
SystemTimeToFileTime
FileTimeToSystemTime
RemoveDirectoryA
CreateDirectoryA
SetFileAttributesA
MoveFileExA
DeleteFileA
CreateFileA
CopyFileA
LoadLibraryA
GetProcAddress
SetCurrentDirectoryA
GetShortPathNameA
FindNextFileA
GetUserDefaultLangID
GetCommandLineW
GetCommandLineA
GetModuleFileNameA
GetTempFileNameA
GlobalSize
SetEvent
UnmapViewOfFile
LocalUnlock
LocalLock
LocalAlloc
GetFileSize
RtlUnwind
SetLastError
RaiseException
GetCurrentDirectoryW
SetCurrentDirectoryW
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
HeapAlloc
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetModuleFileNameW
HeapCreate
GetPrivateProfileStringA
FreeLibrary
WritePrivateProfileStringA
CloseHandle
GetLastError
SizeofResource
Sleep
FindResourceA
LoadResource
LockResource
FreeResource
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
GetLocalTime
GetCurrentThreadId
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
ReadFile
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetTimeZoneInformation
WriteFile
LCMapStringW
ExitProcess
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetProcessHeap
SetEndOfFile
WriteConsoleW
LoadLibraryW
FlushFileBuffers
SetStdHandle
HeapReAlloc
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
EnumSystemLocalesA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidLocale
GetStringTypeW
HeapSize
Sections
.text Size: 348KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ