Static task
static1
Behavioral task
behavioral1
Sample
2024-08-06_aba0aed4eb7d0d8f4c0354834c1fdd16_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-06_aba0aed4eb7d0d8f4c0354834c1fdd16_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-06_aba0aed4eb7d0d8f4c0354834c1fdd16_mafia
-
Size
436KB
-
MD5
aba0aed4eb7d0d8f4c0354834c1fdd16
-
SHA1
ac421e0034a8ad1931de54dfc8b5b219a9989469
-
SHA256
8d8afd814b6227cafd109b040d138fe03e17b175be3a33ca7fa0740a5ec673e4
-
SHA512
31b963e5492ebd30a750f2b3a245d53437b069be3afbbf1986a11a98f659241c2c8b020a59af7806a56bb8adb9e56a85f3afa6153e35ab8905ea339befb2111e
-
SSDEEP
12288:WeAFNxPi7eFmaGEN2nRR825YSh85/ORNv5rnqSm5:WTN++mr1nX7YShe/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-06_aba0aed4eb7d0d8f4c0354834c1fdd16_mafia
Files
-
2024-08-06_aba0aed4eb7d0d8f4c0354834c1fdd16_mafia.exe windows:5 windows x86 arch:x86
cc59589afd5bcf48c7e3d38c98f2dec0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateThread
CreateMutexW
WaitForSingleObject
ReleaseMutex
FindResourceA
FreeLibrary
LoadResource
UpdateResourceA
EndUpdateResourceW
EnumResourceTypesA
SizeofResource
EnumResourceLanguagesA
SetLastError
BeginUpdateResourceW
LoadLibraryA
LockResource
BeginUpdateResourceA
UpdateResourceW
EnumResourceNamesA
EndUpdateResourceA
GetVersionExW
MultiByteToWideChar
CreateProcessW
GetCurrentProcess
GetModuleHandleW
LoadLibraryW
GetFileAttributesA
TerminateProcess
GetProcAddress
GetSystemInfo
GetCommandLineA
CompareStringW
WriteConsoleW
CloseHandle
GetLastError
CreateFileW
ReadFile
WriteFile
SetFilePointer
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
InitializeCriticalSection
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
FlushFileBuffers
SetEnvironmentVariableA
GetConsoleMode
GetConsoleCP
SetStdHandle
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
GetCommandLineW
HeapSetInformation
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
user32
GetSystemMetrics
PostMessageW
advapi32
RegEnumValueA
RegOpenKeyW
RegCloseKey
RegOpenKeyExA
ws2_32
send
gethostbyname
closesocket
inet_ntoa
__WSAFDIsSet
socket
recv
htons
select
WSAStartup
connect
getsockopt
netapi32
Netbios
Sections
.text Size: 185KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ