Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_7c05b68c233b0309a405d31fc093c5a4_mafia.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-06_7c05b68c233b0309a405d31fc093c5a4_mafia.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-06_7c05b68c233b0309a405d31fc093c5a4_mafia
-
Size
845KB
-
MD5
7c05b68c233b0309a405d31fc093c5a4
-
SHA1
b8ad7a8950766e71da84896133e9122fcc838cc7
-
SHA256
46813c7211da3ce788c4beb434fc9c7fcd8d6ccfc3f9847b2852530a214f5cf3
-
SHA512
8d5f00bc4a2b287e4eb2622bfda2ffb58a90df20cbed82b13b171fc80bd0119a65425659d963b55d8d2ce76c441e1315af77cfb5fdf034a9b93cefadc9c95b23
-
SSDEEP
24576:qyk+lxZgBcv8+xN79vE/cYQOEglw9Jz6xCJXO40wlIWmQsm+dYMMMWMMMmqSz:q+lxZgePu0ZVg+uAxMMMWMMMhSz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-06_7c05b68c233b0309a405d31fc093c5a4_mafia
Files
-
2024-07-06_7c05b68c233b0309a405d31fc093c5a4_mafia.exe windows:5 windows x86 arch:x86
7be8cc5a2fda8b738894edd873de219b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetIcon
ImageList_GetImageCount
ord17
ord6
ImageList_Destroy
ord16
ImageList_ReplaceIcon
ImageList_Create
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
PlaySoundA
timeGetTime
kernel32
GetLastError
GetFullPathNameA
FileTimeToSystemTime
CompareFileTime
lstrlenW
FileTimeToLocalFileTime
GetTickCount
SearchPathA
GetCurrentDirectoryW
SetCurrentDirectoryA
GetTempPathA
lstrcmpiA
GetSystemDefaultLangID
GetSystemInfo
GetLocaleInfoA
GlobalMemoryStatusEx
GetComputerNameA
SetErrorMode
GetDriveTypeA
DeviceIoControl
GetDiskFreeSpaceExA
GetVolumeInformationA
GetTimeZoneInformation
lstrcpyW
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentThread
GetThreadPriority
SetThreadPriority
SetThreadAffinityMask
GetCurrentProcess
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
FindFirstFileW
FindNextFileW
GetModuleFileNameW
SetCurrentDirectoryW
FormatMessageA
LocalFree
GetFileSize
CreateFileW
ExpandEnvironmentStringsA
CreateMutexA
SetFileAttributesW
RemoveDirectoryW
DeleteFileW
IsValidCodePage
GetOEMCP
GetCPInfo
HeapCreate
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
RaiseException
GetStartupInfoW
HeapSetInformation
CreateThread
ResumeThread
ExitThread
ExitProcess
GetModuleHandleW
EncodePointer
DecodePointer
HeapReAlloc
HeapFree
HeapAlloc
InterlockedCompareExchange
LCMapStringW
LCMapStringA
GetStringTypeExW
GetStringTypeExA
GetUserDefaultLCID
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
HeapSize
FreeEnvironmentStringsW
LoadLibraryW
GetCommandLineA
GetEnvironmentStringsW
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
GetEnvironmentVariableA
lstrcpynA
GetSystemDirectoryA
GetWindowsDirectoryA
GetCurrentDirectoryA
Sleep
TlsGetValue
SetLocalTime
GetLocalTime
FindClose
CreateDirectoryA
SystemTimeToFileTime
GetSystemTime
RemoveDirectoryA
MoveFileA
CopyFileA
WritePrivateProfileStructA
GetPrivateProfileStructA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
GetProcAddress
GetVersionExA
SetEnvironmentVariableA
FreeLibrary
LoadLibraryA
WideCharToMultiByte
GetACP
MultiByteToWideChar
GetExitCodeProcess
OpenProcess
WaitForSingleObject
CreateProcessA
lstrcmpA
SetFilePointer
ReadFile
lstrcatA
GlobalAlloc
DeleteFileA
CloseHandle
lstrlenA
WriteFile
CreateFileA
GlobalFree
GlobalUnlock
GlobalLock
lstrcpyA
GetModuleFileNameA
SetStdHandle
FlushFileBuffers
WriteConsoleW
SetEndOfFile
GetProcessHeap
TlsAlloc
user32
TranslateMessage
TranslateAcceleratorA
IsDialogMessageA
GetMessageA
GetKeyState
GetLastActivePopup
RegisterClassExA
LoadAcceleratorsA
ExitWindowsEx
SendMessageTimeoutA
GetUpdateRect
PostMessageA
GetScrollInfo
GetSystemMenu
MonitorFromRect
GetMenuStringA
SetCapture
PostQuitMessage
GetAsyncKeyState
SetForegroundWindow
AppendMenuA
InsertMenuA
DeleteMenu
CheckMenuItem
IsWindow
EndPaint
BeginPaint
SetMenuDefaultItem
DrawTextA
LoadBitmapA
WinHelpA
IsIconic
ReleaseCapture
LoadCursorA
SetCursor
ClientToScreen
GetWindowPlacement
MonitorFromPoint
FindWindowA
keybd_event
DefWindowProcA
TrackPopupMenuEx
GetCursorPos
SystemParametersInfoA
EnumDisplayMonitors
GetKeyboardType
EnumDisplayDevicesA
wsprintfW
DialogBoxIndirectParamA
SetLayeredWindowAttributes
DestroyMenu
GetSubMenu
UpdateWindow
ShowWindow
SetTimer
CheckMenuRadioItem
KillTimer
DispatchMessageA
PeekMessageA
WaitForInputIdle
GetClassNameA
LoadImageA
SetFocus
DrawMenuBar
EnableMenuItem
GetMenu
DestroyIcon
DestroyWindow
GetClientRect
GetWindowTextA
IsWindowEnabled
GetParent
SetWindowTextA
InvalidateRect
MoveWindow
ScreenToClient
GetScrollPos
GetWindowRect
EnumChildWindows
EnableScrollBar
SetScrollInfo
ShowScrollBar
SetWindowPos
GetMonitorInfoA
MonitorFromWindow
CreateWindowExA
GetSystemMetrics
LoadMenuA
SetMenu
EnableWindow
ReleaseDC
GetDC
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDlgItemTextA
GetWindowTextLengthA
MessageBoxA
EndDialog
SetWindowLongA
GetWindowLongA
GetDlgItem
LoadIconA
SetDlgItemTextA
SendDlgItemMessageA
CallWindowProcA
SendMessageA
DialogBoxParamA
wsprintfA
LoadStringA
SetWindowPlacement
LoadStringW
gdi32
CreateCompatibleBitmap
SetBkColor
CreateSolidBrush
SetTextColor
SetBkMode
DeleteDC
BitBlt
GetObjectA
CreateCompatibleDC
LineTo
MoveToEx
CreatePen
Rectangle
DeleteObject
GetTextExtentPoint32A
SelectObject
CreateFontA
GetDeviceCaps
GetStockObject
comdlg32
GetSaveFileNameA
CommDlgExtendedError
GetOpenFileNameA
ChooseColorA
advapi32
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegFlushKey
GetUserNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
LookupAccountNameA
RegCloseKey
shell32
SHGetSpecialFolderLocation
ExtractIconA
DragAcceptFiles
ExtractIconExA
SHGetPathFromIDListA
SHBrowseForFolderA
DragFinish
SHFileOperationA
ShellExecuteA
DragQueryFileA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoTaskMemFree
oleaut32
VariantClear
SysAllocString
VariantInit
iphlpapi
GetAdaptersInfo
wsock32
gethostbyname
htons
getservbyname
ioctlsocket
WSACleanup
closesocket
shutdown
gethostbyaddr
socket
connect
inet_ntoa
recv
send
WSAStartup
Sections
.text Size: 564KB - Virtual size: 564KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ