Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_851b167f9ff3f3f1109ca6718fdd9889_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_851b167f9ff3f3f1109ca6718fdd9889_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_851b167f9ff3f3f1109ca6718fdd9889_mafia
-
Size
975KB
-
MD5
851b167f9ff3f3f1109ca6718fdd9889
-
SHA1
a43b3f75171122494cf9f7f78d443bb893a4045f
-
SHA256
6ad7c534c0d4d95b3e0963dab23d87c961939f1730f1232d549026dcb454c30c
-
SHA512
25f87f9051bab092c7614dcec4535d4e96c8f93f6cfcd597eed2bfbcaa8df6b562a5a4c75ec6e00ecc860991f6f6c4874adc146fae6bf4d08960768834c23e7e
-
SSDEEP
24576:xxVc7OTiCTO7tG7vBMNtjK0iXEI/gZ2t:uYStUpMNtjK0iXdJt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-19_851b167f9ff3f3f1109ca6718fdd9889_mafia
Files
-
2024-04-19_851b167f9ff3f3f1109ca6718fdd9889_mafia.exe windows:5 windows x86 arch:x86
44f880738a952027860bc2144d52b815
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostname
inet_ntoa
getsockname
send
getpeername
WSAIoctl
select
WSAGetLastError
gethostbyname
shutdown
setsockopt
WSACleanup
bind
__WSAFDIsSet
getsockopt
listen
accept
connect
WSAStartup
inet_addr
htonl
htons
recv
socket
closesocket
winmm
timeSetEvent
PlaySoundA
timeGetTime
timeKillEvent
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
userenv
ExpandEnvironmentStringsForUserA
CreateEnvironmentBlock
DestroyEnvironmentBlock
kernel32
Process32First
SetEvent
WaitNamedPipeW
WriteFile
GetSystemDirectoryW
LoadLibraryW
Sleep
CreateEventA
GetExitCodeProcess
ReadFile
CreateFileW
Process32Next
OpenEventA
WaitForMultipleObjects
lstrcatW
CreateToolhelp32Snapshot
OutputDebugStringA
GetVersionExA
GetCurrentProcessId
GetEnvironmentVariableA
SetCurrentDirectoryA
SetFileAttributesA
ResumeThread
CreateThread
CreateFileA
GetFileSize
CompareFileTime
GetFileTime
SetFilePointer
MoveFileExA
SetEndOfFile
SetErrorMode
SystemTimeToFileTime
SetFileTime
GetDriveTypeA
GetFileAttributesA
FileTimeToSystemTime
FlushFileBuffers
CreateDirectoryA
GetLogicalDriveStringsA
MoveFileA
GetSystemTime
GetCurrentThread
VirtualFreeEx
ReadProcessMemory
CreateProcessA
TerminateProcess
SetThreadPriority
VirtualAllocEx
SetProcessShutdownParameters
ReleaseMutex
ResetEvent
FindResourceA
SetLastError
SizeofResource
LockResource
AllocConsole
FormatMessageA
GetStdHandle
WriteConsoleA
GlobalDeleteAtom
GlobalGetAtomNameA
GlobalAddAtomA
Beep
SetEnvironmentVariableA
RtlUnwind
GetCPInfo
GetTimeZoneInformation
HeapReAlloc
GetConsoleMode
GetConsoleCP
InterlockedIncrement
InterlockedDecrement
GetStartupInfoW
HeapSetInformation
GetCommandLineA
InitializeCriticalSectionAndSpinCount
SetStdHandle
ExitProcess
GetModuleHandleW
FindFirstFileExA
EncodePointer
DecodePointer
TlsFree
TlsAlloc
DuplicateHandle
ReleaseSemaphore
CreateSemaphoreA
TlsSetValue
TlsGetValue
GetFileType
lstrcatA
lstrcmpiA
InterlockedExchange
GetProcessHeap
HeapFree
HeapAlloc
lstrcpynA
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetLocalTime
GetVolumeInformationA
GetLocaleInfoA
SetVolumeLabelA
DosDateTimeToFileTime
GetFullPathNameA
lstrcpyA
LoadResource
OpenFileMappingA
ExitThread
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateMutexA
CreateFileMappingA
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CloseHandle
GetPrivateProfileStructA
PeekNamedPipe
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
OpenProcess
WritePrivateProfileSectionA
WritePrivateProfileStructA
WinExec
GetLastError
GetComputerNameA
GetVersion
GetSystemInfo
lstrlenA
DeleteFileA
GetTempPathA
FindNextFileA
FindClose
CopyFileA
FindFirstFileA
FreeLibrary
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessTimes
InitializeCriticalSection
GetSystemTimeAsFileTime
GetTickCount
GetCurrentProcess
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalUnlock
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalSize
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleFileNameW
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
HeapCreate
GetCurrentDirectoryW
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetEnvironmentVariableW
CompareStringW
GetCurrentDirectoryA
GetDriveTypeW
GetFileInformationByHandle
TerminateThread
RemoveDirectoryA
user32
TrackPopupMenu
GetMenuItemID
GetSubMenu
LoadMenuA
EnableMenuItem
RemoveMenu
SetMenuDefaultItem
DestroyMenu
EnableWindow
ToAscii
GetKeyState
GetAsyncKeyState
MapVirtualKeyA
VkKeyScanA
IsIconic
DestroyWindow
PostThreadMessageA
SendNotifyMessageA
WaitMessage
PeekMessageA
ChangeClipboardChain
SetClipboardViewer
GetClipboardOwner
EnumDesktopWindows
GetClassNameA
OpenDesktopA
FillRect
DrawTextA
WaitForInputIdle
FindWindowExA
WindowFromPoint
RegisterWindowMessageA
EnumWindows
GetIconInfo
IsDlgButtonChecked
SetRect
IsWindow
IsWindowVisible
EndPaint
DrawIconEx
BeginPaint
GetUpdateRect
IntersectRect
DestroyIcon
keybd_event
GetKeyboardState
mouse_event
SetActiveWindow
MessageBeep
FlashWindow
ChangeDisplaySettingsExA
EnumDisplaySettingsA
ScreenToClient
GetWindowRect
SendDlgItemMessageA
SetForegroundWindow
LoadStringA
GetClientRect
SetFocus
InvalidateRect
ReleaseDC
GetDlgItem
EndDialog
GetCursorPos
PostMessageA
CheckDlgButton
SetDlgItemInt
GetDlgItemInt
GetProcessWindowStation
GetWindowTextA
SetWindowTextA
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
MoveWindow
ExitWindowsEx
GetDesktopWindow
wsprintfA
FindWindowA
GetWindowThreadProcessId
SystemParametersInfoA
GetForegroundWindow
MessageBoxA
SendMessageA
GetMessageA
GetUserObjectInformationA
SetTimer
RegisterClassExA
PostQuitMessage
GetThreadDesktop
KillTimer
LoadIconA
OpenInputDesktop
CloseDesktop
TranslateMessage
SetWindowLongA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
SetThreadDesktop
DispatchMessageA
GetSystemMetrics
LoadImageA
AdjustWindowRect
LoadCursorA
IsRectEmpty
GetDC
CloseClipboard
IsClipboardFormatAvailable
RegisterClipboardFormatA
GetClipboardData
EmptyClipboard
OpenClipboard
SetClipboardData
OemToCharA
CharToOemA
wvsprintfA
GetScrollInfo
gdi32
SetBkColor
SetTextColor
GetBitmapBits
SetDIBColorTable
GdiFlush
CreatePalette
SelectPalette
CreateFontIndirectA
GetObjectA
ExtEscape
GetSystemPaletteEntries
GetRgnBox
GetRegionData
SetRectRgn
PtInRegion
CombineRgn
OffsetRgn
CreateRectRgn
PatBlt
StretchBlt
CreateDCA
SetBkMode
GetClipBox
GetStockObject
CreateSolidBrush
BitBlt
DeleteDC
CreateDIBSection
GetDeviceCaps
GetDIBits
DeleteObject
SelectObject
CreateCompatibleDC
RealizePalette
GetPixel
CreateCompatibleBitmap
advapi32
GetSecurityDescriptorLength
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
IsValidSecurityDescriptor
GetSecurityDescriptorSacl
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
GetSecurityDescriptorControl
GetKernelObjectSecurity
IsValidAcl
RegCreateKeyA
SetServiceStatus
RegDeleteValueA
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
DeleteService
StartServiceCtrlDispatcherA
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
FreeSid
RevertToSelf
AllocateAndInitializeSid
ImpersonateLoggedOnUser
EqualSid
GetTokenInformation
OpenProcessToken
CreateProcessAsUserA
RegSetValueExA
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
OpenServiceA
GetUserNameA
LookupAccountSidA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
SHAppBarMessage
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteExA
ShellExecuteA
Shell_NotifyIconA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
imm32
ImmGetDefaultIMEWnd
Sections
.text Size: 767KB - Virtual size: 766KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 589KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ