Static task
static1
Behavioral task
behavioral1
Sample
2024-09-01_3efd6455e104c265d720aa406c014e58_mafia.exe
Resource
win7-20240705-en
General
-
Target
2024-09-01_3efd6455e104c265d720aa406c014e58_mafia
-
Size
2.3MB
-
MD5
3efd6455e104c265d720aa406c014e58
-
SHA1
b7bac534a778fe7f76405fd03a744341e17db965
-
SHA256
fcd52b6c4e6c2cc0b9f841a481752abdc8791cf3871ab45de238ce178fcc3019
-
SHA512
c8b2a092ac3a68cdd3059d28ff6457d364439fae2981eb2a35107b454a4149a6780bb516691c75a68279eed97973b10484fa4254d071f2ecefe02b53ac548a25
-
SSDEEP
49152:zpE6gw14kZV2HXsMnmjEREseBSsxHnfXsrHYi2YijiHWB39bR9t9TBBgQg:NwYJYx4bTBe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-01_3efd6455e104c265d720aa406c014e58_mafia
Files
-
2024-09-01_3efd6455e104c265d720aa406c014e58_mafia.exe windows:5 windows x86 arch:x86
136bea86936e01e1f983ef31dafa8b2a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SizeofResource
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetShortPathNameW
SetLastError
GetFileAttributesW
SetFileAttributesW
LoadResource
LocalFree
GetProcessHeap
SetEndOfFile
CreateProcessA
GetExitCodeProcess
FindResourceW
GetEnvironmentVariableW
CreateDirectoryW
Sleep
Process32NextW
TerminateProcess
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
WaitForSingleObject
CreateProcessW
GetTickCount
lstrlenW
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
CloseHandle
DeviceIoControl
CreateFileW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentProcessId
GetNativeSystemInfo
GetCurrentProcess
GetVersionExW
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileAttributesA
SetStdHandle
LoadLibraryW
SetEnvironmentVariableA
GetTimeZoneInformation
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLocaleInfoW
HeapFree
GetCPInfo
HeapAlloc
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
ExitProcess
DeleteFileW
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
LCMapStringW
CompareStringW
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetACP
GetOEMCP
IsValidCodePage
ReadFile
WriteFile
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
SetFilePointer
user32
MessageBoxW
GetSystemMetrics
advapi32
AllocateAndInitializeSid
SetNamedSecurityInfoW
SetEntriesInAclW
GetNamedSecurityInfoW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ControlService
QueryServiceStatus
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
FreeSid
shell32
SHGetFolderPathW
psapi
GetModuleFileNameExW
EnumProcessModules
shlwapi
StrStrIW
wintrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
CryptCATAdminReleaseContext
CryptCATAdminCalcHashFromFileHandle
WinVerifyTrust
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
Sections
.text Size: 438KB - Virtual size: 437KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE