Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_17ec14df4c76d54a3c383f1b64f5d031_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_17ec14df4c76d54a3c383f1b64f5d031_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_17ec14df4c76d54a3c383f1b64f5d031_mafia
-
Size
1.9MB
-
MD5
17ec14df4c76d54a3c383f1b64f5d031
-
SHA1
1b430f489eed4996378a83b009a1dcde7235d1f6
-
SHA256
befac840d03da78314e2f93b068604bd8edeb0c535f3e8d5c8bebe85a392d455
-
SHA512
260d5bd344f3ed45edbc89ca15472998f0cf8da9666ebd8e4a513280ef12512c079cb76e1038b2c6e24e11313829c1eeb64d8211f8982fea3810e7f9838fd6fb
-
SSDEEP
49152:EwSr8pfeSGzrCLKpKEuKlKuuGaXKy4IBAUZLYBH776:EwVReSorFeBAUZL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-13_17ec14df4c76d54a3c383f1b64f5d031_mafia
Files
-
2024-03-13_17ec14df4c76d54a3c383f1b64f5d031_mafia.exe windows:5 windows x86 arch:x86
1886b8966c11b5ae3d966534ef3e7881
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsExA
ws2_32
WSAGetLastError
gethostbyname
inet_ntoa
htonl
getservbyname
htons
gethostbyaddr
getservbyport
ntohs
WSASetLastError
closesocket
select
send
recv
getsockopt
inet_addr
__WSAFDIsSet
connect
ioctlsocket
socket
WSAStartup
listen
bind
getsockname
kernel32
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetEndOfFile
SetStdHandle
WriteConsoleW
LoadLibraryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
CreateFileW
GetFullPathNameW
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
SetFilePointer
ReadFile
GetCurrentDirectoryA
FindClose
FindFirstFileA
FindNextFileA
CompareStringA
Sleep
GetLastError
GetTempPathA
RemoveDirectoryA
DeleteFileA
SetFileAttributesA
CopyFileA
CreateDirectoryA
GetFileAttributesA
CloseHandle
CreateFileA
GetDriveTypeA
FlushFileBuffers
GetDiskFreeSpaceExA
CreateThread
CreateEventW
TerminateThread
WaitForSingleObject
VerifyVersionInfoW
VerSetConditionMask
GetVersionExA
GetModuleHandleA
SetEvent
GetVolumeInformationA
LocalFree
LocalAlloc
FindVolumeClose
FindNextVolumeA
FindFirstVolumeA
FreeLibrary
GetExitCodeProcess
CreateProcessA
GetStartupInfoA
LoadLibraryA
GetProcAddress
SetCurrentDirectoryA
GetModuleFileNameA
SetDllDirectoryA
MultiByteToWideChar
CreateMutexA
ReleaseMutex
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedCompareExchange
GetCurrentThreadId
TlsAlloc
InterlockedIncrement
TlsSetValue
DuplicateHandle
GetCurrentThread
GetCurrentProcess
TlsGetValue
GetSystemDirectoryA
GetACP
WideCharToMultiByte
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
RaiseException
RtlUnwind
HeapFree
GetCommandLineA
HeapSetInformation
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
HeapAlloc
GetTimeFormatA
GetDateFormatA
SetConsoleCtrlHandler
HeapReAlloc
GetDriveTypeW
FindFirstFileExW
ExitThread
ResumeThread
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
TlsFree
GetModuleHandleW
SetLastError
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameW
GetLocaleInfoW
HeapCreate
HeapSize
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
user32
RegisterClassExA
DefWindowProcA
DestroyWindow
PostQuitMessage
RegisterDeviceNotificationA
CreateWindowExA
ShowWindow
UpdateWindow
PostMessageA
GetMessageA
TranslateMessage
DispatchMessageA
UnregisterDeviceNotification
UnregisterClassA
advapi32
RegDeleteValueA
RegQueryValueExA
RegDeleteKeyExA
RegCreateKeyExA
RegEnumValueA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
Sections
.text Size: 799KB - Virtual size: 799KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1006KB - Virtual size: 1006KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ