Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_e878aa2aa6163abbf3fda1f89ac74f05_mafia.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-07_e878aa2aa6163abbf3fda1f89ac74f05_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_e878aa2aa6163abbf3fda1f89ac74f05_mafia
-
Size
156KB
-
MD5
e878aa2aa6163abbf3fda1f89ac74f05
-
SHA1
d1faf860ef77db6782bb5e14e3f748adb9ee4508
-
SHA256
d09a171d6be1fffe53665aa8f6da57fc7115633c49703284c3168ca7875a7edc
-
SHA512
00027b73955b238cbcf7b384fded64eab99ce625d71b260759bd942d3f4d5760d018102f1bf5a703ee331f242dcf317d6ca4cbbce070891f9531c510e7288a4e
-
SSDEEP
3072:kaJ2+3/S1l9fnfwgD2YNAf62bJwHVclq1MKcr7rreIQ:7ssyl9fntDCf62b2Hilk0vr7Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_e878aa2aa6163abbf3fda1f89ac74f05_mafia
Files
-
2024-09-07_e878aa2aa6163abbf3fda1f89ac74f05_mafia.exe windows:5 windows x86 arch:x86
a1dd53d60bd1396f737657d563c347dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
GetProcAddress
Process32Next
CreateToolhelp32Snapshot
WinExec
GetLastError
GetCurrentProcessId
LocalFree
lstrcpyA
CreateFileA
GetVolumeInformationA
CreateMailslotA
GetLogicalDriveStringsA
lstrcatA
TerminateProcess
Sleep
WideCharToMultiByte
OpenProcess
Process32First
QueryDosDeviceA
GetCurrentProcess
CloseHandle
lstrlenA
CreateFileW
SetStdHandle
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
InitializeCriticalSectionAndSpinCount
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
IsProcessorFeaturePresent
HeapCreate
GetModuleHandleW
ExitProcess
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
SetEndOfFile
advapi32
RegCloseKey
AdjustTokenPrivileges
RegEnumKeyA
GetUserNameA
BuildExplicitAccessWithNameA
RegOpenKeyExA
LookupPrivilegeValueA
RegQueryValueExA
RegSetValueExA
LookupAccountNameA
SetNamedSecurityInfoA
SetEntriesInAclA
OpenProcessToken
GetNamedSecurityInfoA
wininet
InternetSetOptionA
psapi
GetProcessImageFileNameA
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ