Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_f2787c6ceb2a282ec1e8b5c02087f8a3_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-03_f2787c6ceb2a282ec1e8b5c02087f8a3_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-03_f2787c6ceb2a282ec1e8b5c02087f8a3_mafia
-
Size
8.3MB
-
MD5
f2787c6ceb2a282ec1e8b5c02087f8a3
-
SHA1
ed8f2a8e6f30756128dc54dd39b98b56011e69c0
-
SHA256
bd5a62ca889064e1eedb7534f46e51c4c4042e24de70e13b2dc3f947344cea99
-
SHA512
14681ece9929119acd21c11c14fb8b503566535481843c79c649ad69b2e128189c85a6eea0d25ce0b8f615097d294eb9faa315936854dd02f1f2da885d2215f7
-
SSDEEP
98304:6II8bKuK5kGO02ytGx48hW6fCeXJB90H6MDGxblZ1fmXYSPKJsp9hY+qbJVdqO9D:6IquXV/481VBtYGDwpPnlaV/qY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-03_f2787c6ceb2a282ec1e8b5c02087f8a3_mafia
Files
-
2024-10-03_f2787c6ceb2a282ec1e8b5c02087f8a3_mafia.exe windows:5 windows x86 arch:x86
5e4d226b6501333b51712fea5dd53fb6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExW
DuplicateIcon
ExtractIconExW
SHGetFolderPathW
wsock32
select
htons
htonl
socket
gethostbyname
send
ioctlsocket
ntohl
recv
connect
WSAStartup
gdiplus
GdiplusStartup
GdiplusShutdown
GdipFree
GdipAlloc
GdipDeleteBrush
GdipGetImageBounds
GdipCloneImage
GdipLoadImageFromStream
GdipDrawImageRectI
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
kernel32
GetTickCount
InterlockedDecrement
GetLongPathNameW
lstrlenW
Sleep
GetCurrentProcess
FlushInstructionCache
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetLastError
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedIncrement
LoadLibraryW
MulDiv
GetCommandLineW
CreateMutexW
WaitForSingleObject
GetTempPathW
CloseHandle
LocalFree
CreateThread
OpenProcess
GetCurrentProcessId
WriteProcessMemory
QueryPerformanceCounter
GetFileAttributesW
CreateFileW
LockResource
GetWindowsDirectoryW
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
GetDateFormatW
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
CreateRemoteThread
VirtualFreeEx
FlushFileBuffers
VirtualAllocEx
DeviceIoControl
GetVolumeInformationW
CompareStringW
GlobalReAlloc
TlsAlloc
TlsGetValue
SetEndOfFile
GetSystemDirectoryW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapCreate
GetStdHandle
WriteFile
GetLocaleInfoW
TlsSetValue
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
GetCPInfo
RtlUnwind
GetTimeZoneInformation
FindNextFileW
FindFirstFileExW
GetDriveTypeW
FindClose
GetFullPathNameW
DeleteFileW
RemoveDirectoryW
GetStartupInfoW
HeapSetInformation
CreateDirectoryW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetSystemTimeAsFileTime
ExitProcess
InitializeCriticalSection
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
WideCharToMultiByte
InterlockedPopEntrySList
VirtualAlloc
SetEnvironmentVariableA
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetSystemTime
ReadFile
SetFilePointer
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
GetVersionExW
TlsFree
user32
FillRect
UnregisterClassA
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
ScreenToClient
EndDialog
CreateWindowExW
DefWindowProcW
SetWindowLongW
IsWindow
UpdateWindow
PeekMessageW
ShowWindow
InvalidateRect
DispatchMessageW
SetWindowPos
MapWindowPoints
GetParent
SystemParametersInfoW
GetDialogBaseUnits
SetTimer
HideCaret
EndPaint
GetSystemMetrics
ClientToScreen
KillTimer
EnumWindows
GetClassNameW
PostMessageW
DialogBoxIndirectParamW
SetForegroundWindow
DialogBoxParamW
FindWindowW
GetActiveWindow
PostThreadMessageW
DestroyIcon
GetWindowThreadProcessId
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
BeginPaint
GetMessageW
MessageBoxW
CharNextW
GetWindowTextW
SetFocus
DestroyWindow
CreateDialogParamW
GetWindow
GetWindowLongW
gdi32
GetStockObject
SelectObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
CreateFontW
GetTextExtentPoint32W
DeleteDC
DeleteObject
SetBkColor
advapi32
RegQueryValueExW
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegCloseKey
RegEnumKeyExW
ole32
CreateBindCtx
CreateStreamOnHGlobal
CLSIDFromProgID
CoInitialize
CLSIDFromString
GetRunningObjectTable
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoSetProxyBlanket
oleaut32
OleLoadPicture
SysFreeString
CreateErrorInfo
SysAllocString
VariantCopy
VariantChangeType
VariantInit
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
SysStringLen
VariantClear
Sections
.text Size: 267KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7.9MB - Virtual size: 7.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ