Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_ba04e6fb9ad38aa00f5c7614f58c2ec9_mafia.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-28_ba04e6fb9ad38aa00f5c7614f58c2ec9_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_ba04e6fb9ad38aa00f5c7614f58c2ec9_mafia
-
Size
191KB
-
MD5
ba04e6fb9ad38aa00f5c7614f58c2ec9
-
SHA1
11cae3a97db2d72aa34bf045e9ca46b966dec6dd
-
SHA256
2402b5e20e34e7a29436dac930c4c59dda9ef428c0a402a78c1cde3cf6983b95
-
SHA512
2cd14f7430831390153affc2c0c96c4a45ce510c3cc26edd10f6d26b8e46c5e0a5405d4e59c4f2332d43b75f264cd7aea092e533456fcba505e4af70668fc605
-
SSDEEP
3072:/C+pKMBDaAUglsJF81wmDu1A10uDEQtC9qrbehComMcbEcf:/C+IMBDw98S00ME9cGC5BEcf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-28_ba04e6fb9ad38aa00f5c7614f58c2ec9_mafia
Files
-
2024-09-28_ba04e6fb9ad38aa00f5c7614f58c2ec9_mafia.exe windows:5 windows x86 arch:x86
ede20cb98d8e830c0306ba8a3774cbd9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
OpenProcess
GetProcAddress
GetSystemTime
TerminateProcess
FindClose
FindNextFileA
FindFirstFileA
SetConsoleTextAttribute
GetStdHandle
GetModuleHandleA
ExitProcess
GetVolumeInformationA
lstrlenA
WriteFile
GetConsoleWindow
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetFullPathNameA
WaitForSingleObject
GetComputerNameA
CreateProcessA
DeleteFileA
CopyFileA
GetTempPathA
IsDebuggerPresent
SetConsoleTitleA
CompareStringW
SetEndOfFile
CreateFileW
GetExitCodeProcess
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
GetStringTypeW
GetCurrentProcessId
WideCharToMultiByte
GetCurrentProcess
GetLastError
CreateFileA
CloseHandle
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetFileAttributesA
GetLocaleInfoW
LoadLibraryW
SetFilePointer
ReadFile
Sleep
GetStartupInfoW
SetHandleCount
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
GetModuleHandleW
WriteConsoleW
GetFileType
GetModuleFileNameW
GetCommandLineA
HeapSetInformation
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapSize
HeapCreate
GetConsoleCP
SetEnvironmentVariableA
user32
DestroyIcon
GetWindowRect
MessageBoxA
LoadIconA
DefWindowProcA
CreateWindowExA
RegisterClassExA
LoadCursorA
SetWindowPos
RegisterWindowMessageA
GetSystemMetrics
advapi32
GetUserNameA
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
shell32
ShellExecuteA
Shell_NotifyIconA
wininet
InternetConnectW
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
HttpSendRequestW
HttpOpenRequestW
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
urlmon
URLDownloadToFileA
Sections
.text Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 997KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ