Static task
static1
Behavioral task
behavioral1
Sample
2024-08-14_681a0fcafcd3e1ce76636e04105d78ee_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-14_681a0fcafcd3e1ce76636e04105d78ee_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-14_681a0fcafcd3e1ce76636e04105d78ee_mafia
-
Size
187KB
-
MD5
681a0fcafcd3e1ce76636e04105d78ee
-
SHA1
478a2b5410e91903ac9e22fcffb89e835e9c2284
-
SHA256
12027f4ce5b07066df14e6d61c12c5a9193f851a003c99bf649f97cc8250be6a
-
SHA512
a95ba1050c81c6d4b907e6f5a0a0fa4576a60f2b6cbc4b677366b8f5e3af289c52c2f5477b2a0e9da51449bc46cb4ed88d9c52e059ff641f28dcac439e845701
-
SSDEEP
3072:GTLJsnQntJ/Zbnfh9VPghZ/Vo63KhkVm+K1W4MUx9hr1b551lI4XXZ4gh:adsQtJtnfh6o63BVm+K1f9hrj5hHK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-14_681a0fcafcd3e1ce76636e04105d78ee_mafia
Files
-
2024-08-14_681a0fcafcd3e1ce76636e04105d78ee_mafia.exe windows:5 windows x86 arch:x86
bb61d22d0fbce56ee981682ac90c684d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
InterlockedCompareExchange
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
CreateEventA
CloseHandle
Sleep
WaitForSingleObject
SetEvent
GetLastError
GetCurrentThreadId
SwitchToThread
SetLastError
InterlockedExchange
CreateEventW
CancelIo
WideCharToMultiByte
lstrlenW
ResetEvent
CreateWaitableTimerW
SetWaitableTimer
HeapCreate
LoadLibraryW
TryEnterCriticalSection
ResumeThread
SetThreadContext
GetThreadContext
VirtualAllocEx
CreateProcessA
GetSystemDirectoryA
GetExitCodeProcess
OpenProcess
GetTickCount
GetModuleFileNameW
CreateThread
GetConsoleWindow
CreateFileW
SetStdHandle
WriteConsoleW
GetStringTypeW
IsValidLocale
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
HeapFree
HeapAlloc
VirtualAlloc
GetProcAddress
VirtualFree
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
SetFilePointer
ReadFile
GetConsoleMode
GetConsoleCP
GetStartupInfoW
GetFileType
SetHandleCount
GetLocaleInfoW
HeapReAlloc
HeapSize
GetProcessHeap
EncodePointer
DecodePointer
InitializeCriticalSection
MultiByteToWideChar
RtlUnwind
RaiseException
ExitThread
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
user32
DispatchMessageW
ShowWindow
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjects
GetInputState
PostThreadMessageA
advapi32
RegCreateKeyW
RegOpenKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
ws2_32
WSAGetLastError
send
select
socket
gethostbyname
WSAEventSelect
connect
WSAIoctl
setsockopt
closesocket
WSACleanup
WSAStartup
WSACreateEvent
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
WSAResetEvent
shutdown
WSACloseEvent
WSASetLastError
htons
recv
winmm
timeGetTime
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ