Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_b3866195a5ac36f69519b8c14fa73eaf_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-26_b3866195a5ac36f69519b8c14fa73eaf_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_b3866195a5ac36f69519b8c14fa73eaf_mafia
-
Size
274KB
-
MD5
b3866195a5ac36f69519b8c14fa73eaf
-
SHA1
4ea9c45836458c685374e958bcf8533715954750
-
SHA256
52b4a49b39da859449aeb3e5bee4de3b7008efbdc67bf3939dc040c186c71ded
-
SHA512
9ffd01732d62cf45a754d314bd1f30c4dbde488dadce624bf1d192edabb60aa012391e889c867ecf995ff1074438bbec57b064748a1edcd5bae8a1bd447445fe
-
SSDEEP
6144:EDdFcINkVSsAsu/XDILT7RU/L58Q0KlHzOkDI+WCci:mdFcl9Aj/XDI3VUNlljDI+rH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-26_b3866195a5ac36f69519b8c14fa73eaf_mafia
Files
-
2024-05-26_b3866195a5ac36f69519b8c14fa73eaf_mafia.exe windows:5 windows x86 arch:x86
9c15ae7648e2ef58c1f756062cd5b585
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetSetOptionExW
InternetOpenW
InternetCrackUrlW
InternetReadFile
InternetConnectW
HttpSendRequestW
InternetCloseHandle
HttpOpenRequestW
InternetAttemptConnect
HttpQueryInfoW
HttpAddRequestHeadersW
InternetSetOptionW
urlmon
URLDownloadToCacheFileW
kernel32
GetCurrentThreadId
ReleaseMutex
CloseHandle
DeleteFileW
GetCurrentProcessId
LocalFree
GetCurrentProcess
GetLastError
GetCommandLineW
GetFileAttributesW
GetTempPathW
LoadLibraryW
GetProcAddress
GetFileAttributesExW
SetEvent
GetTickCount
Sleep
ReadFile
InterlockedExchange
MoveFileW
ResetEvent
GetExitCodeThread
CreateEventW
ResumeThread
CreateThread
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
CreateFileW
GetModuleFileNameW
WriteFile
OutputDebugStringW
WaitForSingleObject
SetFilePointer
CreateMutexW
GetFileSize
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
SetEnvironmentVariableA
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
CreateFileA
WriteConsoleW
SetEndOfFile
GetProcessHeap
CompareStringW
HeapCreate
GetFileType
GetStdHandle
SetHandleCount
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
HeapFree
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
HeapSize
GetModuleHandleW
ExitProcess
GetTimeZoneInformation
user32
FindWindowExW
IsWindowVisible
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetFolderPathW
SHCreateDirectoryExW
ShellExecuteW
CommandLineToArgvW
rpcrt4
UuidCreateSequential
ws2_32
WSAStartup
gethostbyname
WSACleanup
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.erdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE