Static task
static1
Behavioral task
behavioral1
Sample
2024-04-18_c4f15843d438049533470fe828a9d021_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-18_c4f15843d438049533470fe828a9d021_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-18_c4f15843d438049533470fe828a9d021_mafia
-
Size
856KB
-
MD5
c4f15843d438049533470fe828a9d021
-
SHA1
96dd5c28dc4bf81c5e815265eac8eff3ac341296
-
SHA256
75e7d947585d4ec4acc825c4a0831772b1eba97b1f9ae3f49ea0c62762947377
-
SHA512
7d5eeff48dd9e114ab5a9fb63964b4b852edfa264729669f0d9cfcbab08e5118984727fabe5c2f236f96c51434968aaf38d127d5ec0c749071106871a660f78e
-
SSDEEP
12288:wnsQh51N6KmlWaGI3psEiNfxyyjj5ddddxleXSpRv1bAYA8:OKJ3psEiNfxyyjj5ddddWip11pA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-18_c4f15843d438049533470fe828a9d021_mafia
Files
-
2024-04-18_c4f15843d438049533470fe828a9d021_mafia.exe windows:5 windows x86 arch:x86
8b7ee96d1ddf04dfad9e83b4b0343c5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
InterlockedCompareExchange
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
CreateEventA
CloseHandle
Sleep
WaitForSingleObject
SetEvent
GetLastError
GetCurrentThreadId
SwitchToThread
SetLastError
InterlockedExchange
CreateEventW
CancelIo
WideCharToMultiByte
lstrlenW
ResetEvent
CreateWaitableTimerW
SetWaitableTimer
GetProcAddress
HeapCreate
TryEnterCriticalSection
ResumeThread
SetThreadContext
GetThreadContext
VirtualAllocEx
CreateProcessA
GetSystemDirectoryA
GetExitCodeProcess
OpenProcess
GetTickCount
GetModuleFileNameW
CreateThread
GetConsoleWindow
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CreateFileW
SetStdHandle
WriteConsoleW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
HeapFree
HeapAlloc
VirtualAlloc
LoadLibraryW
VirtualFree
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
SetFilePointer
ReadFile
GetConsoleMode
GetConsoleCP
GetStartupInfoW
GetFileType
SetHandleCount
GetLocaleInfoW
HeapReAlloc
HeapSize
GetProcessHeap
EncodePointer
DecodePointer
InitializeCriticalSection
MultiByteToWideChar
RtlUnwind
RaiseException
ExitThread
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
GetCommandLineW
HeapSetInformation
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
WriteFile
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
user32
DispatchMessageW
ShowWindow
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjects
GetInputState
PostThreadMessageA
advapi32
RegCreateKeyW
RegOpenKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
ws2_32
WSAGetLastError
send
select
recv
gethostbyname
WSAEventSelect
connect
WSAIoctl
setsockopt
closesocket
WSACleanup
WSAStartup
WSACreateEvent
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
WSAResetEvent
shutdown
WSACloseEvent
WSASetLastError
htons
socket
winmm
timeGetTime
Sections
.text Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 669KB - Virtual size: 668KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ