Static task
static1
Behavioral task
behavioral1
Sample
2024-08-25_34447996b4f58d6a44fe2ed0321af9fd_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-25_34447996b4f58d6a44fe2ed0321af9fd_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-25_34447996b4f58d6a44fe2ed0321af9fd_mafia
-
Size
2.4MB
-
MD5
34447996b4f58d6a44fe2ed0321af9fd
-
SHA1
88a0fb64a7a3360226f21f886709742d6b7564f5
-
SHA256
e3bbc76f1c9fd0467112e82edad2c6f76ab00775f7ea5e2c83b4ad998ba2e628
-
SHA512
a57dd87ab9f20d8a9bebd11f56e2f5567de3310e0b5ffd5daafd3589d5fa3e74dd77133c7395cb89c27d5d2529ac36008173e59d91cca8785ed7cd79ea22a493
-
SSDEEP
49152:/ZoiS9VWc/KnPQxKa6sf4aJAIZpY6VX8DIMX/DSiQTOSiKXVCmb95E+pVqaw+co5:/ZoFVW7nPQxKaj4aJAIXYmX8DIMX/WEu
Malware Config
Signatures
Files
-
2024-08-25_34447996b4f58d6a44fe2ed0321af9fd_mafia.exe windows:5 windows x86 arch:x86
76f662293ba3fe7962f6d42f8801aef6
Code Sign
87:c0:6e:32:05:c9:0d:8c:c2:4f:a9:12:98:bd:d7:94:5c:79:a3:74Signer
Actual PE Digest87:c0:6e:32:05:c9:0d:8c:c2:4f:a9:12:98:bd:d7:94:5c:79:a3:74Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
CompareStringW
WriteConsoleW
GetTimeZoneInformation
SetEnvironmentVariableA
SetHandleCount
IsValidCodePage
GetStdHandle
GetLocaleInfoW
GetCurrentDirectoryW
OutputDebugStringA
HeapCreate
LCMapStringW
GetConsoleMode
GetConsoleCP
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFileType
SetStdHandle
HeapSize
HeapQueryInformation
ExitThread
VirtualQuery
VirtualAlloc
HeapReAlloc
GetStartupInfoW
HeapSetInformation
GetCommandLineA
EncodePointer
RaiseException
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
DecodePointer
ExitProcess
RtlUnwind
FindResourceExW
GetUserDefaultLCID
VirtualProtect
SearchPathA
GetProfileIntA
GetTickCount
GetFileTime
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
GetFileAttributesExA
SetErrorMode
GetNumberFormatA
GetWindowsDirectoryA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
lstrcmpiA
GetCurrentDirectoryA
lstrcpyA
GetSystemDirectoryW
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedIncrement
FileTimeToSystemTime
GetThreadLocale
GetModuleFileNameW
ReleaseActCtx
CreateActCtxW
GetPrivateProfileIntA
GetCurrentThread
GetUserDefaultUILanguage
ConvertDefaultLocale
GetSystemDefaultUILanguage
GetLocaleInfoA
LoadLibraryExA
GetModuleHandleW
InterlockedExchange
SuspendThread
ResumeThread
SetThreadPriority
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryW
ActivateActCtx
DeactivateActCtx
lstrcmpW
FindResourceA
FreeResource
SetLastError
GlobalFree
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
lstrlenW
MulDiv
CreateFileW
DeviceIoControl
CreateThread
GetLogicalDriveStringsW
GetDriveTypeW
GetVolumeInformationW
CreateFileMappingA
OpenEventA
CreateProcessA
lstrcmpA
GetPrivateProfileStringA
InitializeCriticalSection
CreateMutexA
SetCurrentDirectoryA
GetCurrentProcessId
GetCurrentProcess
WritePrivateProfileStringA
GetACP
FormatMessageA
UnmapViewOfFile
MapViewOfFileEx
WaitForSingleObject
ResetEvent
WinExec
SetEvent
CreateEventA
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryA
FreeLibrary
OpenProcess
TerminateProcess
FindNextFileA
InterlockedDecrement
lstrlenA
WideCharToMultiByte
GetVersionExA
GetSystemInfo
CreateToolhelp32Snapshot
Process32First
Process32Next
GetTempPathA
GetTempFileNameA
FindFirstFileA
FindClose
GetLastError
MultiByteToWideChar
CopyFileA
CreateFileA
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
CloseHandle
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
Sleep
GetProcessHeap
user32
WaitMessage
ReleaseCapture
SetCapture
InvalidateRect
DeleteMenu
LoadCursorW
SetLayeredWindowAttributes
EnumDisplayMonitors
SetRectEmpty
CopyImage
RealChildWindowFromPoint
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
DestroyMenu
GetMenuItemInfoA
InflateRect
SetWindowContextHelpId
MapDialogRect
GetWindowThreadProcessId
ShowOwnedPopups
SetCursor
PostQuitMessage
SetWindowTextA
IsDialogMessageA
CheckDlgButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
CharUpperA
TrackPopupMenu
GetKeyState
SetMenu
DrawStateA
GetScrollRange
SetParent
GetScrollPos
SetClassLongA
ShowScrollBar
RedrawWindow
IsWindowVisible
ValidateRect
UpdateWindow
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
DrawEdge
DrawFrameControl
ToAsciiEx
GetMenu
SetWindowPos
GetKeyboardLayout
GetKeyboardState
WindowFromPoint
GetSystemMetrics
EnableWindow
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuStringA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
EqualRect
CopyRect
wsprintfA
GetDC
ReleaseDC
IsIconic
GetClientRect
UnregisterClassA
CharNextA
OffsetRect
CopyAcceleratorTableA
IsRectEmpty
SetRect
IntersectRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
GetMenuDefaultItem
CreatePopupMenu
MapVirtualKeyA
GetAsyncKeyState
InvertRect
DrawFocusRect
HideCaret
DrawIcon
GetSystemMenu
AppendMenuA
LoadIconW
GetMessageA
TranslateMessage
DispatchMessageA
GetCursorPos
PtInRect
KillTimer
EnableScrollBar
NotifyWinEvent
GetIconInfo
LoadImageA
DrawIconEx
IsZoomed
ScrollWindow
SetWindowRgn
MoveWindow
GetCaretPos
SetCaretPos
ShowCaret
CreateCaret
SystemParametersInfoA
GetWindowRect
SetTimer
PostMessageA
SendMessageA
SetWindowLongA
ShowWindow
DestroyIcon
FindWindowExA
FindWindowA
SetScrollPos
DestroyAcceleratorTable
LoadAcceleratorsW
SetForegroundWindow
LoadMenuW
GetWindowRgn
DestroyCursor
SubtractRect
GetDoubleClickTime
CharUpperBuffA
CopyIcon
GetUpdateRect
FrameRect
IsClipboardFormatAvailable
SetMenuDefaultItem
CreateMenu
TranslateMDISysAccel
DrawMenuBar
DefMDIChildProcA
DefFrameProcA
PostThreadMessageA
IsMenu
MonitorFromPoint
UpdateLayeredWindow
UnionRect
MapVirtualKeyExA
IsCharLowerA
LoadImageW
EmptyClipboard
CloseClipboard
SetClipboardData
OpenClipboard
GetKeyNameTextA
RegisterClipboardFormatA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
LoadAcceleratorsA
InsertMenuItemA
TranslateAcceleratorA
LockWindowUpdate
BringWindowToTop
SetCursorPos
SetScrollRange
CreateAcceleratorTableA
gdi32
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
GetStockObject
SelectPalette
GetObjectType
CreatePen
CreateSolidBrush
CreateHatchBrush
GetTextMetricsA
CreateDIBitmap
CreateCompatibleBitmap
CreateRectRgnIndirect
EnumFontFamiliesA
GetTextCharsetInfo
GetBkColor
GetTextColor
GetRgnBox
SetRectRgn
CombineRgn
CreateRectRgn
PatBlt
DPtoLP
CreatePalette
GetPaletteEntries
GetNearestPaletteIndex
RealizePalette
GetSystemPaletteEntries
CreateDIBSection
CreateRoundRectRgn
CreatePolygonRgn
CreateEllipticRgn
Polyline
Ellipse
Polygon
SetDIBColorTable
StretchBlt
SetPixel
Rectangle
OffsetRgn
EnumFontFamiliesExA
LPtoDP
GetWindowOrgEx
GetViewportOrgEx
PtInRegion
FillRgn
FrameRgn
GetBoundsRect
ExtFloodFill
SetPaletteEntries
SetPixelV
GetTextFaceA
SelectClipRgn
DeleteObject
SetLayout
GetLayout
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
GetTextExtentPoint32A
ExtTextOutA
BitBlt
CreateCompatibleDC
CreateFontIndirectA
GetObjectA
SetBkColor
SetTextColor
CreateDCA
CopyMetaFileA
GetDeviceCaps
GetMapMode
SetBitmapBits
GetBitmapBits
CreateBitmap
EnumFontsA
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
InitializeSecurityDescriptor
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegEnumKeyExA
RegOpenKeyExA
RevertToSelf
ImpersonateLoggedOnUser
GetUserNameA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
SetSecurityDescriptorDacl
RegDeleteValueA
RegEnumValueA
shell32
DragQueryFileA
SHGetSpecialFolderLocation
ShellExecuteA
SHGetFileInfoA
Shell_NotifyIconA
ord727
SHGetSpecialFolderPathA
SHAppBarMessage
SHBrowseForFolderA
SHGetPathFromIDListA
DragFinish
SHGetDesktopFolder
comctl32
ImageList_GetIconSize
_TrackMouseEvent
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
StrStrIA
PathRemoveFileSpecW
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoInitializeEx
RevokeDragDrop
OleUninitialize
OleGetClipboard
RegisterDragDrop
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemFree
CoCreateInstance
CoInitialize
ReleaseStgMedium
CoUninitialize
CLSIDFromString
CoFreeUnusedLibraries
OleInitialize
CreateStreamOnHGlobal
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
IsAccelerator
OleLockRunning
OleIsCurrentClipboard
OleFlushClipboard
DoDragDrop
CoRevokeClassObject
CoRegisterMessageFilter
CLSIDFromProgID
CoCreateGuid
OleDuplicateData
CoTaskMemAlloc
CoLockObjectExternal
oleaut32
VariantCopy
SysAllocStringByteLen
VariantTimeToSystemTime
SystemTimeToVariantTime
SysStringLen
VarBstrFromDate
OleCreateFontIndirect
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SafeArrayDestroy
SysFreeString
SysAllocString
oledlg
ord8
gdiplus
GdipDeleteFontFamily
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreateFontFamilyFromName
GdipCreateFont
GdipCreatePen1
GdipDrawLineI
GdipDeletePen
GdipDrawString
GdipDeleteStringFormat
GdipCreateStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetImageAttributesColorKeys
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipGetDC
GdipReleaseDC
GdipDrawImageRectRectI
GdipGraphicsClear
GdipDeleteFont
GdipDrawImageI
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipDeleteGraphics
GdipDrawImageRectI
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipGetImageHeight
GdipGetImageWidth
GdipAlloc
GdipFree
GdipDisposeImage
GdipCloneImage
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromHBITMAP
GdiplusStartup
GdiplusShutdown
GdipCreateFromHDC
GdipSetInterpolationMode
GdipGetImagePixelFormat
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromStream
imagehlp
MakeSureDirectoryPathExists
ws2_32
closesocket
WSAStartup
WSACleanup
socket
gethostbyname
inet_addr
htons
connect
send
WSAGetLastError
select
__WSAFDIsSet
recv
vcomp100
_vcomp_for_static_end
_vcomp_for_static_simple_init
_vcomp_fork
zlib1
inflateInit2_
inflate
inflateEnd
oleacc
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
winmm
PlaySoundA
riched20
ord4
imm32
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 442KB - Virtual size: 442KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ