Static task
static1
Behavioral task
behavioral1
Sample
2024-06-08_4e6ed4aeab111fa2fdccf50a2154cb90_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-08_4e6ed4aeab111fa2fdccf50a2154cb90_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-08_4e6ed4aeab111fa2fdccf50a2154cb90_mafia
-
Size
709KB
-
MD5
4e6ed4aeab111fa2fdccf50a2154cb90
-
SHA1
0830423b8dac30800d6b6217e3704206a0517bd3
-
SHA256
28824e84811d0d9182c6aaae8dd79b541b090ff4fa4bec11736323bddadf107e
-
SHA512
fc456a72df2b651f455b9cf4cb4fee4ec144dbde240b4cb9cb5710cb9ac8229a57446937643a6922d9932635cc9e1285d8102e6b004114f9f765b1bd7d4999b7
-
SSDEEP
12288:BHJPcq2CJUWfB0Kg/r348QpcEYY+y+h4DHWq97JCK1Yqbl/Afhjt7UVv7qvCcG:BHJ9wYx+hw5h1Yqbl/AffYqY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-08_4e6ed4aeab111fa2fdccf50a2154cb90_mafia
Files
-
2024-06-08_4e6ed4aeab111fa2fdccf50a2154cb90_mafia.exe windows:4 windows x86 arch:x86
40cb174fdf45363b72262c6b8ded59d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugBreak
lstrcpyW
FindResourceA
FreeResource
LoadResource
GetCurrentProcess
SizeofResource
GetConsoleWindow
LockResource
CloseHandle
CreateFileA
ReadFile
VirtualFree
FreeLibrary
WaitForSingleObject
CreateRemoteThread
OpenProcess
VirtualFreeEx
ReadProcessMemory
GetProcAddress
VirtualAlloc
VirtualAllocEx
LoadLibraryA
GetSystemInfo
WriteProcessMemory
GetFileSize
SetFilePointer
WriteFile
Sleep
SystemTimeToTzSpecificLocalTime
GetTickCount
GetTimeZoneInformation
GetCurrentThread
InitializeCriticalSection
TerminateThread
LeaveCriticalSection
EnterCriticalSection
OpenThread
GetExitCodeThread
DeleteCriticalSection
GetCurrentThreadId
SuspendThread
ResumeThread
AllocConsole
ReadConsoleA
SetConsoleMode
SetConsoleTitleA
GetStdHandle
AttachConsole
SetConsoleCtrlHandler
SetConsoleWindowInfo
GetCurrentProcessId
HeapAlloc
HeapFree
GetProcessHeap
IsBadReadPtr
VirtualProtect
GetCommandLineA
HeapSetInformation
FatalAppExitA
DecodePointer
EncodePointer
GetModuleHandleW
ExitProcess
GetFullPathNameA
HeapReAlloc
ExitThread
CreateThread
RtlUnwind
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
DuplicateHandle
MoveFileA
CreateProcessA
DeleteFileA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
QueryPerformanceCounter
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoW
LoadLibraryW
GetDriveTypeW
CompareStringW
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
IsProcessorFeaturePresent
CreatePipe
GetExitCodeProcess
HeapSize
WriteConsoleW
GetCurrentDirectoryW
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
lstrlenW
IsBadWritePtr
InterlockedDecrement
InterlockedIncrement
GetFileAttributesA
LocalFree
GetLastError
MultiByteToWideChar
WideCharToMultiByte
FormatMessageA
GetModuleFileNameA
GetStartupInfoW
GetModuleHandleA
ole32
OleRegGetUserType
CreateOleAdviseHolder
CoTaskMemAlloc
OleCreate
OleSetContainedObject
StringFromIID
CLSIDFromString
CLSIDFromProgID
CoRegisterClassObject
CoRevokeClassObject
MkParseDisplayName
CreateBindCtx
CoCreateInstance
CoTaskMemFree
StringFromCLSID
OleInitialize
OleUninitialize
CoLockObjectExternal
shlwapi
SHDeleteKeyA
user32
IsWindow
IsWindowVisible
GetClientRect
RegisterClassA
CallWindowProcA
MapWindowPoints
EqualRect
GetActiveWindow
ShowWindow
SetWindowPos
DefWindowProcA
IntersectRect
CreateWindowExA
GetWindowLongA
MessageBoxA
GetSystemMenu
SetActiveWindow
ModifyMenuA
GetWindowThreadProcessId
GetMessageA
TranslateMessage
PeekMessageA
DispatchMessageA
SetForegroundWindow
SetWindowRgn
GetWindowRect
wsprintfA
SetFocus
OffsetRect
WinHelpA
gdi32
SetWindowOrgEx
SetWindowExtEx
DeleteObject
CreateRectRgnIndirect
SetViewportOrgEx
SetViewportExtEx
SetMapMode
advapi32
RegCloseKey
RegOpenKeyExA
IsTextUnicode
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
RegEnumKeyExA
RegQueryValueExA
RegSetValueExA
oleaut32
GetActiveObject
VariantInit
VariantCopyInd
VariantClear
LoadTypeLibEx
SysFreeString
SysStringLen
SysAllocStringLen
LoadRegTypeLi
LHashValOfNameSys
SafeArrayCreateVector
VariantTimeToSystemTime
SafeArrayAccessData
VariantCopy
SafeArrayDestroy
SafeArrayCreate
SystemTimeToVariantTime
SafeArrayGetDim
VariantChangeType
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayPutElement
DispGetIDsOfNames
UnRegisterTypeLi
Sections
.text Size: 478KB - Virtual size: 477KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.aauto Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ