Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia
-
Size
2.4MB
-
MD5
14d8c900ec33aee016a8c0877e0f1577
-
SHA1
b07c8d59c64c0e22c2bddb18bac512fad46d493d
-
SHA256
02b7cf6d81b1723d0153b24ffae8ef0e183ee98aa40b0b15e1b31527c3368cd4
-
SHA512
7c48113c0183124848f05d148ac4ff1be7970d5a980633f8470ac206c221f066c54ad5a3e98ce01a515ebc2d8870a48e23b0afc087c2e8881534df9aa8c68f3b
-
SSDEEP
49152:wW/0gqRwuMCoWn8iC2elj9hYe3qRNsrtGKT9hCHp1tVxNxrEh3S/P+hmBCSmsXVL:rCoW8iCRjcqqRNsr0715a3SuhmBdTlv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia
Files
-
2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe windows:5 windows x86 arch:x86
1ca0524118d0fda0a70479ae0d39af0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetModuleHandleExW
GetSystemDirectoryA
GetModuleFileNameA
GetTempPathA
LocalFree
CreateFileA
MoveFileExA
GetTickCount
GetFileAttributesA
FindFirstFileA
SetLastError
RemoveDirectoryA
SetFileAttributesA
FindClose
FindNextFileA
CloseHandle
DeleteFileA
Sleep
FormatMessageW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
FindResourceA
LoadResource
SizeofResource
LockResource
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
FreeLibrary
LoadLibraryW
InterlockedIncrement
InterlockedExchange
GetStringTypeW
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
GetModuleHandleA
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetModuleFileNameW
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
ReadFile
SetFilePointer
FlushFileBuffers
HeapSize
SetStdHandle
SetEndOfFile
GetProcessHeap
WriteConsoleW
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
CreateFileW
GetProcAddress
GetLastError
CreateDirectoryA
CreateProcessA
SetDllDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetModuleHandleExA
EncodePointer
RaiseException
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 584KB - Virtual size: 588KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE