Static task
static1
Behavioral task
behavioral1
Sample
2024-06-20_50a6740e2322137dc072ae843fa4ed97_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-20_50a6740e2322137dc072ae843fa4ed97_mafia.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-20_50a6740e2322137dc072ae843fa4ed97_mafia
-
Size
205KB
-
MD5
50a6740e2322137dc072ae843fa4ed97
-
SHA1
a05fda150718a8f867fc6c289b6db6144c776855
-
SHA256
a6972c9865f82c0aea387436a38d61b55afe1d19aba96ba84d00076ca78263de
-
SHA512
c2dd4bcbbde67d0be79150b93cfa8e8ab2d2ec0555ab44470a7a3d854c44cdb0d0b189dd8c778221daf43a29f8ade2e22bb48835a17f34d6e0b93e6629cacf5b
-
SSDEEP
3072:8mQSVNVV8c5qSWRpV43aZkRv95WzPnzM4LyhmsamHH+z:vjV/V9fWR7BIvfWzPnzByQCi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-20_50a6740e2322137dc072ae843fa4ed97_mafia
Files
-
2024-06-20_50a6740e2322137dc072ae843fa4ed97_mafia.exe windows:5 windows x86 arch:x86
905e5823441e67867adce409d9afadbb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
WideCharToMultiByte
CreateFileW
SetStdHandle
CreateProcessW
LoadLibraryW
GetVersion
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
GetCurrentProcessId
GetTickCount
CloseHandle
WriteConsoleW
ExpandEnvironmentStringsW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetLastError
GetModuleHandleW
GlobalAlloc
GlobalLock
MultiByteToWideChar
GlobalUnlock
GlobalFree
GetACP
SetFilePointer
IsValidLocale
GetCommandLineW
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
HeapFree
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
HeapAlloc
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetLocaleInfoW
IsProcessorFeaturePresent
HeapSize
ExitProcess
HeapCreate
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
DefWindowProcW
DialogBoxIndirectParamW
GetClientRect
LoadIconW
GetWindowRect
SetWindowPos
IsDlgButtonChecked
EndDialog
CheckDlgButton
GetDC
DrawTextW
ReleaseDC
SendMessageW
CreateWindowExW
gdi32
SelectObject
GetStockObject
shell32
ShellExecuteW
CommandLineToArgvW
advapi32
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegCreateKeyW
RegOpenKeyW
shlwapi
SHDeleteKeyW
comctl32
ord17
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ