Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_23435cada96ba70226eb86ca4156d8d1_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-18_23435cada96ba70226eb86ca4156d8d1_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-18_23435cada96ba70226eb86ca4156d8d1_mafia
-
Size
257KB
-
MD5
23435cada96ba70226eb86ca4156d8d1
-
SHA1
03ead61e715940264c960528863f270465cf1b39
-
SHA256
3345af34c509ddbc120429d70bc292cdf9310b2aa4eb3bb3875e49afa668b938
-
SHA512
53e8d818ae4e093acd0c66e6eb87f170f50bebd2685fd45d603d0b1a8bdf7e1f65dd35357e4dd4235d6363b51efd4ba2152e8ce3258253c2e70216b55a0b09de
-
SSDEEP
3072:6mAWzdHS2//hJc67iFSpgigNP/p/IupnbK2Wu/B8zxk+r1Sok9BHr:FAo/8ygiyjpnbKoJ8zy+r1Sokr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-18_23435cada96ba70226eb86ca4156d8d1_mafia
Files
-
2024-03-18_23435cada96ba70226eb86ca4156d8d1_mafia.exe windows:5 windows x86 arch:x86
ae936e9299c052bb0c6ebfeceaa35d72
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
LCMapStringW
GetProcessHeap
SetEndOfFile
HeapReAlloc
CreateFileW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
HeapSize
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
FindAtomW
GetExitCodeThread
AddAtomW
GetProcAddress
GetLastError
GetACP
LoadLibraryW
GetLocaleInfoW
GetTickCount
SetStdHandle
WriteConsoleW
SetFilePointer
IsValidCodePage
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
DecodePointer
RtlUnwind
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetModuleHandleW
ExitProcess
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
FatalAppExitA
MultiByteToWideChar
ReadFile
CloseHandle
CreateFileA
GetCPInfo
GetOEMCP
IsValidLocale
user32
GetNextDlgTabItem
CloseClipboard
LoadStringA
LoadIconA
LoadCursorW
LoadKeyboardLayoutW
PeekMessageA
TranslateAcceleratorA
CreateIconFromResource
GetRawInputDeviceInfoW
DispatchMessageA
GetDlgCtrlID
LoadCursorFromFileA
LoadMenuIndirectW
gdi32
CopyMetaFileA
StretchBlt
ColorMatchToTarget
EndPath
CombineTransform
BitBlt
advapi32
ChangeServiceConfigA
AdjustTokenGroups
PrivilegeCheck
AddAccessAllowedAceEx
AdjustTokenPrivileges
shell32
DragQueryFileW
FindExecutableW
ShellExecuteA
Sections
.text Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 7.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ