Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_36c70e302a9d599e362042956666a5af_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-09_36c70e302a9d599e362042956666a5af_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_36c70e302a9d599e362042956666a5af_mafia
-
Size
164KB
-
MD5
36c70e302a9d599e362042956666a5af
-
SHA1
0ba532c155c913a00c8bd187cac4748d7039dddd
-
SHA256
23c4164fd3052be03ca51f67ea13318df0f371794a6f5c01348f79593b18419b
-
SHA512
12c720ab213d97038834280f2771190fdb298eb8b22a6bd0620ffd0ba89a494c87d5e66e49d8a2a5cefc60610b6310afe3b16382cc77813d4421283dbe89b9ee
-
SSDEEP
3072:vJUO0X+Szp+qDcopJuQv0uDKcojae/EII6sD1CMIKc5OCBgwclxv0y9:hUO0X+MpBc6JuQcuO7xq1CMIKZWGd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-09_36c70e302a9d599e362042956666a5af_mafia
Files
-
2024-04-09_36c70e302a9d599e362042956666a5af_mafia.exe windows:5 windows x86 arch:x86
37696d6c3f885c538879322bab79bd34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionAndSpinCount
HeapDestroy
LeaveCriticalSection
HeapCreate
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
Sleep
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
SwitchToThread
SetLastError
WideCharToMultiByte
lstrlenW
InterlockedExchange
ResetEvent
CreateEventW
CancelIo
TryEnterCriticalSection
SetWaitableTimer
LoadLibraryW
InterlockedCompareExchange
CreateWaitableTimerW
GetThreadContext
SetThreadContext
OpenProcess
GetExitCodeProcess
CreateProcessA
GetSystemDirectoryA
VirtualAllocEx
ResumeThread
GetTickCount
GetConsoleWindow
GetModuleFileNameW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CreateThread
CreateFileW
SetStdHandle
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
HeapFree
InterlockedDecrement
InterlockedIncrement
HeapAlloc
VirtualAlloc
GetProcAddress
VirtualFree
GetOEMCP
GetACP
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
TlsFree
TlsSetValue
TlsGetValue
HeapReAlloc
HeapSize
GetProcessHeap
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
ExitThread
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
GetCommandLineW
HeapSetInformation
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
IsProcessorFeaturePresent
WriteFile
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
user32
DispatchMessageW
PostThreadMessageA
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
ShowWindow
GetInputState
advapi32
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
ws2_32
WSAWaitForMultipleEvents
WSAIoctl
connect
WSAStartup
select
WSAResetEvent
WSACleanup
recv
socket
closesocket
gethostbyname
send
WSASetLastError
WSACreateEvent
shutdown
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSACloseEvent
htons
setsockopt
winmm
timeGetTime
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ