Static task
static1
Behavioral task
behavioral1
Sample
2024-05-04_193b352fb0ec2200b62018e2d411cdda_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-04_193b352fb0ec2200b62018e2d411cdda_mafia.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-04_193b352fb0ec2200b62018e2d411cdda_mafia
-
Size
2.6MB
-
MD5
193b352fb0ec2200b62018e2d411cdda
-
SHA1
fc5fcf4951ac3d473f6556f46d9b353a941f2003
-
SHA256
9c2a3153d55ecf6cf92129df61ce87cf627d6500c977ab06fe16358996c785f9
-
SHA512
44af5a59e10b8d03bb6b3e605f72435a8a3f7de333f806baf9afc1ee990ae146e3da4b27ec49fbe45d6ee3ece25f9aed4f2f57c5efe0f4d3b0ece5e52d07acae
-
SSDEEP
49152:r+hSx3hPBTx2TSSJidWfXoiJdpIHIkUXMg5UfzOQTHfaj1I5HSeYtixoJyTUAYUK:r+hSx3hPBTx2T3JidKXoiJ3pkUXMgKOj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-04_193b352fb0ec2200b62018e2d411cdda_mafia
Files
-
2024-05-04_193b352fb0ec2200b62018e2d411cdda_mafia.exe windows:5 windows x86 arch:x86
a8629bf1980a7a725c1cc842a9c62f20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dinput8
DirectInput8Create
d3d9
Direct3DCreate9
d3dx9_43
D3DXMatrixDeterminant
D3DXMatrixMultiply
D3DXVec3TransformCoord
D3DXVec4Transform
D3DXMatrixInverse
D3DXComputeTangentFrameEx
D3DXQuaternionRotationAxis
D3DXQuaternionNormalize
D3DXQuaternionInverse
D3DXQuaternionSlerp
D3DXQuaternionMultiply
D3DXMatrixReflect
D3DXMatrixScaling
D3DXMatrixRotationQuaternion
D3DXQuaternionToAxisAngle
D3DXCreateEffectFromFileA
D3DXCreateTextureFromFileExA
D3DXMatrixTranspose
D3DXMatrixRotationAxis
D3DXVec3Transform
D3DXLoadSurfaceFromFileA
D3DXCreateMeshFVF
D3DXCreateEffectPool
D3DXMatrixPerspectiveFovLH
D3DXLoadSurfaceFromMemory
D3DXMatrixTranslation
D3DXMatrixLookAtLH
D3DXCreateTexture
D3DXGetImageInfoFromFileA
D3DXFilterTexture
D3DXSaveSurfaceToFileA
dsound
ord2
openal32
alSourcePause
alGetSourcei
alSourcef
alGetSourcef
alSourcei
alSource3f
alBufferData
alSourceUnqueueBuffers
alListenerf
alGetListenerf
alSourceQueueBuffers
alSourceStop
alGenBuffers
alDeleteBuffers
alGetBufferi
alcCloseDevice
alcDestroyContext
alcMakeContextCurrent
alDeleteSources
alGenSources
alListenerfv
alcCreateContext
alcOpenDevice
alSourcePlay
alGetError
alSourcefv
alut
alutGetErrorString
alutLoadWAVFile
alutUnloadWAV
alutGetError
psapi
GetProcessMemoryInfo
sqlite3
sqlite3_exec
sqlite3_close
sqlite3_open
version
VerQueryValueW
kernel32
GetLocaleInfoA
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
CreateFileW
GetFullPathNameA
LoadLibraryW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
SetFilePointer
ReadFile
GetStringTypeW
SetHandleCount
HeapCreate
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
EnumSystemLocalesA
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCPInfo
LCMapStringW
IsValidLocale
GetTimeZoneInformation
WideCharToMultiByte
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetDriveTypeW
FindFirstFileExA
GetDriveTypeA
ExitProcess
GetModuleHandleW
GetProcessHeap
SetEndOfFile
GetFileType
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileAttributesA
SetFileAttributesA
SetEnvironmentVariableA
CreateDirectoryA
HeapReAlloc
HeapFree
HeapAlloc
RtlUnwind
RaiseException
DecodePointer
EncodePointer
WriteConsoleW
TlsGetValue
VirtualAlloc
VirtualFree
GetTickCount
VirtualQuery
CreateEventW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
lstrlenA
DeleteFileW
GetCurrentDirectoryW
IsDebuggerPresent
Sleep
DeleteFileA
WaitForSingleObject
OpenMutexA
CloseHandle
ReleaseMutex
TerminateThread
SetThreadPriority
CreateThread
CreateMutexA
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetCurrentDirectoryA
GlobalUnlock
GlobalLock
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateEventA
InterlockedExchange
CreateFileA
InterlockedIncrement
ResetEvent
SetEvent
InterlockedDecrement
GetCurrentProcess
GlobalMemoryStatusEx
FindClose
GlobalAlloc
GetTimeFormatA
GetLocalTime
GetLastError
ResumeThread
Module32Next
CompareStringA
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
GetProcAddress
FindNextFileA
RemoveDirectoryA
FindFirstFileA
QueryPerformanceCounter
SuspendThread
QueryPerformanceFrequency
SetThreadAffinityMask
GetCurrentThread
LockResource
LoadResource
FindResourceA
SetCurrentDirectoryA
GlobalMemoryStatus
GetVersionExA
GetSystemInfo
GetDateFormatA
CompareStringW
user32
ShowCursor
LoadStringW
GetMessageW
DispatchMessageW
PeekMessageW
SetFocus
SetForegroundWindow
GetCursor
GetMessageA
CloseClipboard
GetClipboardData
MessageBoxA
IsClipboardFormatAvailable
IsWindowUnicode
SetWindowTextW
SetClipboardData
EmptyClipboard
SetWindowPos
LoadCursorFromFileA
LoadIconA
SetCursor
OpenClipboard
GetWindowRect
TranslateMessage
DispatchMessageA
RegisterClassExW
GetWindowInfo
SetWindowLongA
PeekMessageA
ChangeDisplaySettingsA
PostQuitMessage
DefWindowProcW
CreateWindowExW
GetWindowLongA
SetWindowLongW
UpdateWindow
GetClientRect
GetKeyboardState
keybd_event
GetDesktopWindow
ShowWindow
gdi32
CreateSolidBrush
shell32
ShellExecuteA
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 333KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ