Static task
static1
Behavioral task
behavioral1
Sample
2024-06-17_c1243a11cdf1a88c0fcfc31e64869cac_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-17_c1243a11cdf1a88c0fcfc31e64869cac_mafia.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-17_c1243a11cdf1a88c0fcfc31e64869cac_mafia
-
Size
3.7MB
-
MD5
c1243a11cdf1a88c0fcfc31e64869cac
-
SHA1
1e1128545953b3881b9643517f31678a6a681440
-
SHA256
f13cf95eca30b6d6148470e43d4eb4442e5323bee1de29f2ab4bf9755022e3d0
-
SHA512
3cd5cc468315594ac36c047a88c20bb410cd392ee092dcb77a51acccd11c481a48f73db21d917dc1850354fdffe974518993903857128bc860e370218745a1ae
-
SSDEEP
98304:7NILfW2HsOm7RMV6dOPAloACZYKnMPr0/O5VYd5kztLh2iTE6:7iC2Mh09qovDnorHVntDTE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-17_c1243a11cdf1a88c0fcfc31e64869cac_mafia
Files
-
2024-06-17_c1243a11cdf1a88c0fcfc31e64869cac_mafia.exe windows:5 windows x86 arch:x86
3205a12c395cc17f18d882faaad12987
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
wsprintfA
MessageBoxA
DestroyMenu
SetWindowTextA
LoadIconA
SetClassLongA
GetDlgItemTextA
EnableWindow
CreateDialogParamA
SetWindowPos
LoadMenuA
ClientToScreen
GetSubMenu
TrackPopupMenu
DestroyWindow
ChildWindowFromPoint
SetCursor
DialogBoxParamA
ShowWindow
LoadCursorA
GetDialogBaseUnits
PostMessageA
GetDlgItem
EndDialog
UpdateWindow
SetDlgItemTextA
BeginPaint
LoadBitmapA
EndPaint
GetDC
ReleaseDC
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
gdi32
GetObjectA
CreateFontIndirectA
SelectObject
StretchBlt
SetTextColor
DeleteObject
GetStockObject
CreateCompatibleDC
Rectangle
SetBkMode
SetROP2
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
kernel32
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetLocaleInfoW
FreeEnvironmentStringsW
GetModuleFileNameW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileType
InitializeCriticalSectionAndSpinCount
HeapReAlloc
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryW
WriteConsoleW
SetStdHandle
CreateFileW
SetEndOfFile
GetProcessHeap
GetEnvironmentStringsW
GetPrivateProfileStringA
GetStdHandle
SetHandleCount
GetProcAddress
GetCurrentThreadId
SetLastError
GetModuleHandleW
TlsFree
ExitProcess
CloseHandle
FormatMessageA
GetLastError
lstrcpyA
VirtualAlloc
lstrlenA
VirtualFree
lstrcmpA
GetFileAttributesA
lstrcatA
GetSystemDirectoryA
GetTempPathA
GetCurrentDirectoryA
ExpandEnvironmentStringsA
CreateDirectoryA
GetFullPathNameA
ReadFile
SetFilePointer
CreateFileA
UnmapViewOfFile
IsBadReadPtr
MapViewOfFile
CreateFileMappingA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
WriteFile
DeleteFileA
GetPrivateProfileIntA
GetTempFileNameA
GetModuleFileNameA
GetCurrentProcess
RemoveDirectoryA
Sleep
CreateThread
WinExec
WaitForSingleObject
CreateProcessA
SetCurrentDirectoryA
GetModuleHandleA
GetCommandLineA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
RaiseException
RtlUnwind
HeapSetInformation
GetStartupInfoW
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ