Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_264c0d32ccb0a297aaa745b19e2f7280_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_264c0d32ccb0a297aaa745b19e2f7280_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_264c0d32ccb0a297aaa745b19e2f7280_mafia
-
Size
157KB
-
MD5
264c0d32ccb0a297aaa745b19e2f7280
-
SHA1
e05f4408105e64d1172030a8069c14336b503bf9
-
SHA256
16515dfc30c790163850cdbf932ed7cdcffdee77111a2cf6e470c1d37205e573
-
SHA512
c6d6efa2d550a8af4df76901d076f53036af48087915e2e5b489db1060b549340a9580c1e696835b33dfc2f4a9940f9c8eee08bf4be11f61c074f31f6780c0d8
-
SSDEEP
3072:u4Je3oRdE7hF0UQlzDdxAnMXXFHq5xbpPFSH:u4Je4k7v0UQlndxAMGbpd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-13_264c0d32ccb0a297aaa745b19e2f7280_mafia
Files
-
2024-03-13_264c0d32ccb0a297aaa745b19e2f7280_mafia.exe windows:5 windows x86 arch:x86
7a03b5fd654022c5f3f480750841af1b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
CreateFileW
SetStdHandle
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
GetStringTypeW
IsValidCodePage
GetTickCount
GetACP
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
HeapSize
GetModuleFileNameW
GetLocaleInfoW
LoadLibraryW
SetFilePointer
ReadFile
CreateMutexA
GetLastError
CloseHandle
CreateDirectoryW
lstrcatW
SetLastError
Sleep
GetModuleHandleA
LoadLibraryA
GetOEMCP
GetProcAddress
FlushFileBuffers
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
RaiseException
RtlUnwind
GetModuleHandleW
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
WriteFile
GetConsoleCP
GetProcessHeap
user32
LoadCursorA
UpdateWindow
RegisterClassA
GetDC
LoadImageA
GetMessageA
TranslateMessage
DispatchMessageA
SetCursor
ReleaseDC
PostQuitMessage
DefWindowProcA
FillRect
GetWindowRect
ShowWindow
GetSystemMetrics
GetForegroundWindow
KillTimer
SetTimer
SetWindowTextA
LoadIconA
SetWindowLongA
GetClientRect
SetWindowPos
wsprintfW
CreateWindowExA
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
CreatePatternBrush
SelectObject
PatBlt
MoveToEx
BitBlt
SetBkMode
TextOutA
GetStockObject
shell32
ShellExecuteW
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ