Behavioral task
behavioral1
Sample
2024-05-29_e97e362beb0f98c0b1948b5c02af4394_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-29_e97e362beb0f98c0b1948b5c02af4394_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-29_e97e362beb0f98c0b1948b5c02af4394_mafia
-
Size
2.6MB
-
MD5
e97e362beb0f98c0b1948b5c02af4394
-
SHA1
3037898f1f6207a1d35dd27810d91315acc034a1
-
SHA256
274f19747acf2fb470a5410352718314c7a9980781497547546e1b8cffa851ac
-
SHA512
0e48599de7edd6dd93c571b17a0d17d6930823fcf3f9945dd0e620a624fff4b445b89c03e760a8ee173171423b7c71376e8c28cf0075f1ad537cf0a94bc46f32
-
SSDEEP
49152:DPuLDBHzpN+D6MUz8wGKNzHn8SoNC/ve6zxWUVh819+j7YuYPAIwOWgxFW6B:qfl7qoAwPzcFw/2YWmG+jXYPfwOWk
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-29_e97e362beb0f98c0b1948b5c02af4394_mafia
Files
-
2024-05-29_e97e362beb0f98c0b1948b5c02af4394_mafia.exe windows:5 windows x86 arch:x86
276935d72730a4f17697f456b248d283
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
LoadLibraryA
DeleteFileA
lstrcatA
GetSystemDirectoryA
lstrcpyA
VirtualProtectEx
SetFileTime
GetFileTime
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
WriteFile
LoadResource
SizeofResource
FindResourceA
GetWindowsDirectoryA
GetVersion
CreateFileA
GetLocalTime
WritePrivateProfileStringA
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
WritePrivateProfileSectionA
GetPrivateProfileStringA
ResumeThread
SetThreadContext
FlushInstructionCache
WriteProcessMemory
GetThreadContext
SuspendThread
CreateProcessW
GetFullPathNameA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
GetLastError
lstrlenA
DeviceIoControl
CreateProcessA
WaitForSingleObject
OpenProcess
GetModuleHandleA
GetProcAddress
ReadProcessMemory
MultiByteToWideChar
CloseHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
LoadLibraryW
FreeLibrary
InitializeCriticalSection
GetModuleFileNameW
GetModuleHandleW
TerminateProcess
GetCurrentProcess
DeleteCriticalSection
CreateEventW
CompareStringW
SetLastError
GetModuleHandleA
VirtualProtect
GetTickCount
EnterCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
WriteProcessMemory
CreateToolhelp32Snapshot
GetCurrentProcessId
GetCurrentThreadId
Thread32First
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
GetSystemInfo
LoadResource
MultiByteToWideChar
WideCharToMultiByte
FindResourceExW
FindResourceExA
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
HeapAlloc
HeapFree
HeapDestroy
HeapCreate
GetSystemTime
GetLocalTime
SystemTimeToFileTime
CompareFileTime
GetCommandLineA
GetLastError
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
Sleep
ExitProcess
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
LoadLibraryA
RtlUnwind
HeapSize
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
VirtualQuery
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
wvsprintfA
MessageBoxA
PostQuitMessage
wsprintfA
MessageBoxW
CharUpperBuffW
advapi32
DeleteService
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ControlService
shlwapi
PathFileExistsA
StrStrIA
msvcr100
strcpy
fclose
fputs
fopen
_strdup
strlen
_mbsnbcpy
sprintf
strtoul
strtod
_mbscmp
_mbsicmp
_mbsstr
_mbschr
_mbsrev
strtol
wcslen
printf
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_invoke_watson
_controlfp_s
??2@YAPAXI@Z
memcpy
??3@YAXPAX@Z
memset
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 513KB - Virtual size: 512KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ