Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_fe204e9aec357d8b647e0b409cdd9915_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_fe204e9aec357d8b647e0b409cdd9915_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_fe204e9aec357d8b647e0b409cdd9915_mafia
-
Size
2.6MB
-
MD5
fe204e9aec357d8b647e0b409cdd9915
-
SHA1
515c8b45814cf6b45c571dc56acdc16364bbdd55
-
SHA256
8db1246ee529fa19902fd3f63ba318c1c4f27c07a9021973217011d0799d4413
-
SHA512
eab44be7ce841a1923a6a1c3865c62f9dbae1cd2c31952caaaf5392b40981435415c008ae92bb654788612998bd19521083456bbf43928a757f437e8c388a9bb
-
SSDEEP
49152:oQespssflUE4R9zdMXkeX7Hj5AOsjfiGiCOs5Z+ZClWDe96gERCELRaa1U0RvYAf:oQespssfln4R9zdMXkeX7Hj5AdDiGiCN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-13_fe204e9aec357d8b647e0b409cdd9915_mafia
Files
-
2024-03-13_fe204e9aec357d8b647e0b409cdd9915_mafia.exe windows:5 windows x86 arch:x86
41e7a82a01a7155b772d8404fd1e9f74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dinput8
DirectInput8Create
d3d9
Direct3DCreate9
d3dx9_43
D3DXMatrixDeterminant
D3DXMatrixMultiply
D3DXVec3TransformCoord
D3DXVec4Transform
D3DXMatrixInverse
D3DXComputeTangentFrameEx
D3DXQuaternionRotationAxis
D3DXQuaternionNormalize
D3DXQuaternionInverse
D3DXQuaternionSlerp
D3DXQuaternionMultiply
D3DXMatrixReflect
D3DXMatrixScaling
D3DXMatrixRotationQuaternion
D3DXQuaternionToAxisAngle
D3DXCreateEffectFromFileA
D3DXCreateTextureFromFileExA
D3DXMatrixTranspose
D3DXMatrixRotationAxis
D3DXVec3Transform
D3DXLoadSurfaceFromFileA
D3DXCreateMeshFVF
D3DXCreateEffectPool
D3DXMatrixPerspectiveFovLH
D3DXLoadSurfaceFromMemory
D3DXMatrixTranslation
D3DXMatrixLookAtLH
D3DXCreateTexture
D3DXGetImageInfoFromFileA
D3DXFilterTexture
D3DXSaveSurfaceToFileA
dsound
ord2
openal32
alSourcePause
alGetSourcei
alSourcef
alGetSourcef
alSourcei
alSource3f
alBufferData
alSourceUnqueueBuffers
alListenerf
alGetListenerf
alSourceQueueBuffers
alSourceStop
alGenBuffers
alDeleteBuffers
alGetBufferi
alcCloseDevice
alcDestroyContext
alcMakeContextCurrent
alDeleteSources
alGenSources
alListenerfv
alcCreateContext
alcOpenDevice
alSourcePlay
alGetError
alSourcefv
alut
alutGetErrorString
alutLoadWAVFile
alutUnloadWAV
alutGetError
psapi
GetProcessMemoryInfo
sqlite3
sqlite3_exec
sqlite3_close
sqlite3_open
version
VerQueryValueW
kernel32
GetLocaleInfoA
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
CreateFileW
GetFullPathNameA
LoadLibraryW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
SetFilePointer
ReadFile
GetStringTypeW
SetHandleCount
HeapCreate
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
EnumSystemLocalesA
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCPInfo
LCMapStringW
IsValidLocale
GetTimeZoneInformation
WideCharToMultiByte
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetDriveTypeW
FindFirstFileExA
GetDriveTypeA
ExitProcess
GetModuleHandleW
GetProcessHeap
SetEndOfFile
GetFileType
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileAttributesA
SetFileAttributesA
SetEnvironmentVariableA
CreateDirectoryA
HeapReAlloc
HeapFree
HeapAlloc
RtlUnwind
RaiseException
DecodePointer
EncodePointer
WriteConsoleW
TlsGetValue
GetTickCount
VirtualFree
VirtualQuery
VirtualAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
lstrlenA
DeleteFileW
GetCurrentDirectoryW
IsDebuggerPresent
Sleep
DeleteFileA
WaitForSingleObject
OpenMutexA
CloseHandle
ReleaseMutex
TerminateThread
SetThreadPriority
CreateThread
CreateMutexA
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetCurrentDirectoryA
GlobalUnlock
GlobalLock
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateEventA
InterlockedExchange
CreateFileA
InterlockedIncrement
ResetEvent
SetEvent
InterlockedDecrement
GetCurrentProcess
GlobalMemoryStatusEx
FindClose
GlobalAlloc
GetTimeFormatA
GetLocalTime
GetLastError
ResumeThread
Module32Next
CompareStringA
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
GetProcAddress
FindNextFileA
RemoveDirectoryA
FindFirstFileA
QueryPerformanceCounter
SuspendThread
QueryPerformanceFrequency
SetThreadAffinityMask
GetCurrentThread
LockResource
LoadResource
FindResourceA
SetCurrentDirectoryA
GlobalMemoryStatus
GetVersionExA
GetSystemInfo
GetDateFormatA
CompareStringW
user32
ShowCursor
LoadStringW
GetMessageW
DispatchMessageW
PeekMessageW
SetFocus
SetForegroundWindow
GetCursor
GetMessageA
CloseClipboard
GetClipboardData
MessageBoxA
IsClipboardFormatAvailable
IsWindowUnicode
SetWindowTextW
SetClipboardData
EmptyClipboard
SetWindowPos
LoadCursorFromFileA
LoadIconA
SetCursor
OpenClipboard
GetWindowRect
TranslateMessage
DispatchMessageA
RegisterClassExW
GetWindowInfo
SetWindowLongA
PeekMessageA
ChangeDisplaySettingsA
PostQuitMessage
DefWindowProcW
CreateWindowExW
GetWindowLongA
SetWindowLongW
UpdateWindow
GetClientRect
GetKeyboardState
keybd_event
GetDesktopWindow
ShowWindow
gdi32
CreateSolidBrush
shell32
ShellExecuteA
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 333KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ