Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_816905c72104b3539e78113283d29e35_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_816905c72104b3539e78113283d29e35_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_816905c72104b3539e78113283d29e35_mafia
-
Size
2.9MB
-
MD5
816905c72104b3539e78113283d29e35
-
SHA1
138d49c182a29dbfbea14a4fc13a72eab4ae6392
-
SHA256
2e1134d5a59817f60f9e0caef0cc6858aff4a4708f548bd10537b05363cb5cf3
-
SHA512
3007ae1bf4dfaec2f2fb2e6a46ae84a0635dc6ef2cb34327e6412a3b71641b964d528a20ca0762569f2eda54e2622000b6c3151a79200306c9a4080f825a6ec3
-
SSDEEP
49152:v59TwDWHT58u0GVaiwP53XlvLF97TuMSUlbQFWKZmtqsjAbpBHM/5B4d3SNKakOB:cOVJwPPLF9PuXUlb7ZtqssbjH/d3aN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-27_816905c72104b3539e78113283d29e35_mafia
Files
-
2024-03-27_816905c72104b3539e78113283d29e35_mafia.exe windows:5 windows x86 arch:x86
9ce2bda53ce061850f2ad44324ab4929
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UpdateWindow
GetSystemMetrics
SystemParametersInfoA
ShowWindow
RedrawWindow
DefWindowProcA
EndPaint
DestroyWindow
RegisterClassExA
SendDlgItemMessageA
FillRect
wsprintfA
GetClientRect
ExitWindowsEx
BeginPaint
SetWindowLongA
MessageBoxA
GetWindowLongA
CreateWindowExA
EndDialog
DialogBoxParamA
gdi32
DeleteObject
CreateSolidBrush
advapi32
OpenServiceA
CreateServiceA
StartServiceA
DeleteService
CloseServiceHandle
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyA
FreeSid
AllocateAndInitializeSid
ReportEventA
LookupPrivilegeValueA
DeregisterEventSource
OpenProcessToken
RegisterEventSourceA
OpenSCManagerA
ole32
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
SysFreeString
VariantClear
SysAllocString
kernel32
FlushFileBuffers
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleW
SetEndOfFile
GetProcessHeap
CreateFileW
InitializeCriticalSection
lstrlenA
LocalFree
HeapFree
HeapReAlloc
GetConsoleMode
GetConsoleCP
ReadFile
SetFilePointer
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
RaiseException
RtlUnwind
HeapSize
IsProcessorFeaturePresent
GetModuleFileNameW
InterlockedDecrement
GetCurrentProcess
CreateDirectoryA
GetLastError
GetProcAddress
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
GetVersionExA
GetEnvironmentVariableA
Sleep
DeleteFileA
CloseHandle
DeviceIoControl
CreateFileA
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetModuleHandleW
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
HeapCreate
WriteFile
Sections
.text Size: 206KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ