Static task
static1
Behavioral task
behavioral1
Sample
2024-06-27_89eb81c36ecd4286161e1c45b6455212_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-27_89eb81c36ecd4286161e1c45b6455212_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-27_89eb81c36ecd4286161e1c45b6455212_mafia
-
Size
1.5MB
-
MD5
89eb81c36ecd4286161e1c45b6455212
-
SHA1
a06d253a13d1b581de46d90036ca231334ae2ce7
-
SHA256
63dd2af5a6509825aebaa6a394cf9eabb74b1e3a71ccb1ca041da62b4154c693
-
SHA512
b3ad336cf4c68f36f9900c21fc3284be281cf2307489655f6965739a89e517decda218fd2601d9ff976ad8f600f5d16541b19ec971f286d5720803d4525662de
-
SSDEEP
24576:i805+9+ZRKT6q546gp8cTVxk0RbGIIrfZr4yEts5kR9aKAcL3YyY6odN0WuGttvd:i8051ZUT6bdpfTVxk0RKotAuBA8YNAGB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-27_89eb81c36ecd4286161e1c45b6455212_mafia
Files
-
2024-06-27_89eb81c36ecd4286161e1c45b6455212_mafia.exe windows:5 windows x86 arch:x86
5e4d226b6501333b51712fea5dd53fb6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExW
DuplicateIcon
ExtractIconExW
SHGetFolderPathW
wsock32
select
htons
htonl
socket
gethostbyname
send
ioctlsocket
ntohl
recv
connect
WSAStartup
gdiplus
GdiplusStartup
GdiplusShutdown
GdipFree
GdipAlloc
GdipDeleteBrush
GdipGetImageBounds
GdipCloneImage
GdipLoadImageFromStream
GdipDrawImageRectI
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
kernel32
GetTickCount
InterlockedDecrement
GetLongPathNameW
lstrlenW
Sleep
GetCurrentProcess
FlushInstructionCache
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetLastError
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedIncrement
LoadLibraryW
MulDiv
GetCommandLineW
CreateMutexW
WaitForSingleObject
GetTempPathW
CloseHandle
LocalFree
CreateThread
OpenProcess
GetCurrentProcessId
WriteProcessMemory
QueryPerformanceCounter
GetFileAttributesW
CreateFileW
LockResource
GetWindowsDirectoryW
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
GetDateFormatW
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
CreateRemoteThread
VirtualFreeEx
FlushFileBuffers
VirtualAllocEx
DeviceIoControl
GetVolumeInformationW
CompareStringW
GlobalReAlloc
TlsAlloc
TlsGetValue
SetEndOfFile
GetSystemDirectoryW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapCreate
GetStdHandle
WriteFile
GetLocaleInfoW
TlsSetValue
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
GetCPInfo
RtlUnwind
GetTimeZoneInformation
FindNextFileW
FindFirstFileExW
GetDriveTypeW
FindClose
GetFullPathNameW
DeleteFileW
RemoveDirectoryW
GetStartupInfoW
HeapSetInformation
CreateDirectoryW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetSystemTimeAsFileTime
ExitProcess
InitializeCriticalSection
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
WideCharToMultiByte
InterlockedPopEntrySList
VirtualAlloc
SetEnvironmentVariableA
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetSystemTime
ReadFile
SetFilePointer
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
GetVersionExW
TlsFree
user32
FillRect
UnregisterClassA
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
ScreenToClient
EndDialog
CreateWindowExW
DefWindowProcW
SetWindowLongW
IsWindow
UpdateWindow
PeekMessageW
ShowWindow
InvalidateRect
DispatchMessageW
SetWindowPos
MapWindowPoints
GetParent
SystemParametersInfoW
GetDialogBaseUnits
SetTimer
HideCaret
EndPaint
GetSystemMetrics
ClientToScreen
KillTimer
EnumWindows
GetClassNameW
PostMessageW
DialogBoxIndirectParamW
SetForegroundWindow
DialogBoxParamW
FindWindowW
GetActiveWindow
PostThreadMessageW
DestroyIcon
GetWindowThreadProcessId
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
BeginPaint
GetMessageW
MessageBoxW
CharNextW
GetWindowTextW
SetFocus
DestroyWindow
CreateDialogParamW
GetWindow
GetWindowLongW
gdi32
GetStockObject
SelectObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
CreateFontW
GetTextExtentPoint32W
DeleteDC
DeleteObject
SetBkColor
advapi32
RegQueryValueExW
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegCloseKey
RegEnumKeyExW
ole32
CreateBindCtx
CreateStreamOnHGlobal
CLSIDFromProgID
CoInitialize
CLSIDFromString
GetRunningObjectTable
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoSetProxyBlanket
oleaut32
OleLoadPicture
SysFreeString
CreateErrorInfo
SysAllocString
VariantCopy
VariantChangeType
VariantInit
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
SysStringLen
VariantClear
Sections
.text Size: 267KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ