Static task
static1
Behavioral task
behavioral1
Sample
2024-06-28_4a0924c3e7079e44966246c1057de747_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-28_4a0924c3e7079e44966246c1057de747_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-28_4a0924c3e7079e44966246c1057de747_mafia
-
Size
1.0MB
-
MD5
4a0924c3e7079e44966246c1057de747
-
SHA1
9ae9a85cdcba274150a561590ceb709cc5ca4508
-
SHA256
00465a6a0df80b9136a40f295febb242ef3eb3a81c24c643aa6639aa79414f84
-
SHA512
4962f7caec157e7f6beaba4c0824b6012edab366bd6cf849bad2ed70645ed6db9fe015b1359ea68f201f1797c473c134958446c32949e62e3670c7389f89871b
-
SSDEEP
24576:HG2EgSiOmJK8f40qsis1fL+rwyf5OH/ItewTvBy81u8vLHII/GY:HGMSiiFs1aR5OH4nBynqII
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-28_4a0924c3e7079e44966246c1057de747_mafia
Files
-
2024-06-28_4a0924c3e7079e44966246c1057de747_mafia.exe windows:5 windows x86 arch:x86
f83216c471b689507b8b5a6a21829624
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetFileType
GetCurrentThreadId
GetVersion
GlobalSize
FindResourceA
IsDebuggerPresent
GetCurrentProcessId
LockResource
GetProcessHeap
DeleteFileA
LoadResource
GetLastError
GetDriveTypeA
GlobalFlags
MoveFileA
WriteFile
SetFilePointer
GetStdHandle
GetProcAddress
GetTickCount
GlobalHandle
IsProcessorFeaturePresent
GetModuleHandleA
FindClose
CompareStringW
CreateFileW
HeapSize
WriteConsoleW
FlushFileBuffers
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
Sleep
GetTimeZoneInformation
SetEndOfFile
SetStdHandle
GetDriveTypeW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
SetHandleCount
ReadFile
MultiByteToWideChar
LCMapStringW
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
FatalAppExitA
DeleteCriticalSection
SetEnvironmentVariableA
RtlUnwind
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
GetModuleHandleW
ExitProcess
DecodePointer
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
HeapDestroy
EncodePointer
GetModuleFileNameW
GetFullPathNameA
CloseHandle
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
SetCurrentDirectoryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
gdi32
GetTextCharset
GetNearestPaletteIndex
SetTextColor
GetMapMode
GetDeviceCaps
GetBkColor
GetNearestColor
GetDCBrushColor
GetFontUnicodeRanges
GetDCPenColor
GetMetaRgn
GetClipRgn
GetTextCharsetInfo
GetFontLanguageInfo
GetCurrentObject
GetTextCharacterExtra
GetObjectType
GetGraphicsMode
GetPixelFormat
GetRandomRgn
UpdateColors
GetTextColor
user32
DrawTextA
ShowWindow
PostMessageA
GetInputState
GetMenuContextHelpId
LoadIconA
EndDialog
CheckDlgButton
BeginPaint
RemovePropA
GetQueueStatus
SetWindowTextA
GetDlgItem
EndPaint
GetMenuItemCount
GetDC
SetFocus
GetWindowLongA
SetDlgItemTextA
MoveWindow
IsWindowEnabled
EnableWindow
GetDlgItemInt
GetKeyboardType
IsWindowUnicode
GetMenuState
GetMenu
GetMenuCheckMarkDimensions
GetPropA
GetMenuItemID
SendMessageA
Sections
.text Size: 905KB - Virtual size: 904KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ