Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_8f626bdfed70d359812cbb6f701c3bc6_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_8f626bdfed70d359812cbb6f701c3bc6_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_8f626bdfed70d359812cbb6f701c3bc6_mafia
-
Size
296KB
-
MD5
8f626bdfed70d359812cbb6f701c3bc6
-
SHA1
ffebe7ceca895589c647fbc2e99d30679656739b
-
SHA256
e3c917a0d4786ec76d00e30bd0a89700da1724b2967bf7bddfabfecfdee03c67
-
SHA512
3b04296796d85212c403da614c60e2b6f69dfabe4bfe47cb6a7af71c05309a928a4471fc4d148be32bc2e937bcd3853728a5b1b39acd52637670378e3eab8072
-
SSDEEP
6144:+1qGrMwgBjH/2JmxGYmRSBRyObfukDrbX:rwg5xxG5RSTvz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-28_8f626bdfed70d359812cbb6f701c3bc6_mafia
Files
-
2024-03-28_8f626bdfed70d359812cbb6f701c3bc6_mafia.exe windows:5 windows x86 arch:x86
59f4d04800d45b0011d21c1a61baeff8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionAndSpinCount
HeapDestroy
LeaveCriticalSection
HeapCreate
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
Sleep
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
SwitchToThread
SetLastError
WideCharToMultiByte
lstrlenW
InterlockedExchange
ResetEvent
CreateEventW
InterlockedCompareExchange
TryEnterCriticalSection
SetWaitableTimer
LoadLibraryW
GetProcAddress
CreateWaitableTimerW
GetThreadContext
SetThreadContext
OpenProcess
GetExitCodeProcess
CreateProcessA
GetSystemDirectoryA
VirtualAllocEx
ResumeThread
GetConsoleWindow
CreateThread
CreateFileW
WriteConsoleW
SetStdHandle
IsValidLocale
HeapFree
InterlockedDecrement
InterlockedIncrement
HeapAlloc
VirtualAlloc
CancelIo
VirtualFree
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
ReadFile
GetStartupInfoW
GetFileType
SetHandleCount
HeapReAlloc
HeapSize
GetProcessHeap
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
ExitThread
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLocaleInfoW
user32
DispatchMessageW
PostThreadMessageA
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
ShowWindow
GetInputState
advapi32
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
ws2_32
WSAWaitForMultipleEvents
WSAIoctl
connect
WSAStartup
select
WSASetLastError
setsockopt
WSACleanup
recv
socket
closesocket
gethostbyname
send
WSACreateEvent
shutdown
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSACloseEvent
htons
WSAResetEvent
winmm
timeGetTime
Sections
.text Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ