Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_7eba78ec778a3aa8e6622304c2d5b2c7_mafia.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-19_7eba78ec778a3aa8e6622304c2d5b2c7_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_7eba78ec778a3aa8e6622304c2d5b2c7_mafia
-
Size
376KB
-
MD5
7eba78ec778a3aa8e6622304c2d5b2c7
-
SHA1
a9721667f020d39ddc5d8f95571a2b2b42d6fc55
-
SHA256
d6513635309299ea98d469529ce9fdfdb432535edae3c39eebd5eb0c966ea651
-
SHA512
ff11aa4db118e2395b85b536689c775dddcc48424f2936efbdf2e396315e2e8897e905f4046647f04512cce2cd1548dd11d31411d2a98878245f44b40ea08617
-
SSDEEP
6144:39RzF2/nPy5t7EA7AkAwqtqwGvJbf4nGGVxuh06porLTdu7jDO4p0bmeoRGvHjt:39NF2/nPy5tYAh5qIwGv0pW06por1u7a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-19_7eba78ec778a3aa8e6622304c2d5b2c7_mafia
Files
-
2024-04-19_7eba78ec778a3aa8e6622304c2d5b2c7_mafia.exe windows:5 windows x86 arch:x86
ae7c8d0802bf17926e3f4db8e63d10c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wtsapi32
WTSQuerySessionInformationA
kernel32
GetWindowsDirectoryW
GetVolumeInformationW
WideCharToMultiByte
Process32FirstW
Module32FirstW
Process32NextW
CreateToolhelp32Snapshot
CloseHandle
LoadLibraryExW
LoadLibraryW
Sleep
GetModuleFileNameW
LockResource
LoadLibraryA
LoadLibraryExA
SetEvent
GetLastError
CreateThread
GetFileSize
CreateProcessW
WaitForSingleObject
FindClose
DeleteFileW
FlushFileBuffers
WriteConsoleW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
FindResourceExW
CreateFileW
GetProcAddress
HeapFree
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
SetConsoleCtrlHandler
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
ExitThread
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
GetCPInfo
RtlUnwind
HeapAlloc
LCMapStringW
FreeLibrary
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThread
ExitProcess
WriteFile
GetStdHandle
GetLocaleInfoW
GetACP
GetOEMCP
IsValidCodePage
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeW
FatalAppExitA
GetUserDefaultLCID
GetLocaleInfoA
user32
wsprintfW
advapi32
RegOpenKeyExA
GetTokenInformation
QueryServiceStatusEx
StartServiceW
ChangeServiceConfig2W
CloseServiceHandle
DuplicateTokenEx
ole32
CoCreateGuid
StringFromGUID2
shell32
ShellExecuteA
wininet
HttpOpenRequestW
HttpSendRequestW
Sections
.text Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ