Static task
static1
Behavioral task
behavioral1
Sample
2024-09-21_ce9bf20ab350d1b24c108e7ffb3b2dff_mafia.exe
Resource
win7-20240903-en
General
-
Target
2024-09-21_ce9bf20ab350d1b24c108e7ffb3b2dff_mafia
-
Size
2.3MB
-
MD5
ce9bf20ab350d1b24c108e7ffb3b2dff
-
SHA1
ffa58982f6d87239a61a1bb77a55340a5f8f9348
-
SHA256
6fab0585eeae829c4b243b4baf8ab5875f0f8964d24c09c1bae13ced5d793bff
-
SHA512
a229f6c9542760a660cf643189dabafef840c85d47d4f750797290da8c232c9b56669c6eb1945838a18c7d785856da67599712937610a87f90866c52b396af0d
-
SSDEEP
49152:mpEEgw15kZV2HXsMnmjEREseBSsxHnfXsrHYihYiVict2r4PRSEk1ul:Q5YuYwt2sEE5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-21_ce9bf20ab350d1b24c108e7ffb3b2dff_mafia
Files
-
2024-09-21_ce9bf20ab350d1b24c108e7ffb3b2dff_mafia.exe windows:5 windows x86 arch:x86
136bea86936e01e1f983ef31dafa8b2a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SizeofResource
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetShortPathNameW
SetLastError
GetFileAttributesW
SetFileAttributesW
LoadResource
LocalFree
GetProcessHeap
SetEndOfFile
CreateProcessA
GetExitCodeProcess
FindResourceW
GetEnvironmentVariableW
CreateDirectoryW
Sleep
Process32NextW
TerminateProcess
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
WaitForSingleObject
CreateProcessW
GetTickCount
lstrlenW
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
CloseHandle
DeviceIoControl
CreateFileW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentProcessId
GetNativeSystemInfo
GetCurrentProcess
GetVersionExW
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileAttributesA
SetStdHandle
LoadLibraryW
SetEnvironmentVariableA
GetTimeZoneInformation
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLocaleInfoW
HeapFree
GetCPInfo
HeapAlloc
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
ExitProcess
DeleteFileW
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
LCMapStringW
CompareStringW
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetACP
GetOEMCP
IsValidCodePage
ReadFile
WriteFile
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
SetFilePointer
user32
MessageBoxW
GetSystemMetrics
advapi32
AllocateAndInitializeSid
SetNamedSecurityInfoW
SetEntriesInAclW
GetNamedSecurityInfoW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ControlService
QueryServiceStatus
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
FreeSid
shell32
SHGetFolderPathW
psapi
GetModuleFileNameExW
EnumProcessModules
shlwapi
StrStrIW
wintrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
CryptCATAdminReleaseContext
CryptCATAdminCalcHashFromFileHandle
WinVerifyTrust
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
Sections
.text Size: 438KB - Virtual size: 437KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE