Static task
static1
Behavioral task
behavioral1
Sample
2024-10-04_10ff97cd8b6daef6430bf688ba806db3_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-04_10ff97cd8b6daef6430bf688ba806db3_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-04_10ff97cd8b6daef6430bf688ba806db3_mafia
-
Size
252KB
-
MD5
10ff97cd8b6daef6430bf688ba806db3
-
SHA1
4cadb6eeb1f3d13e37dd80629a2ad80c07661ec8
-
SHA256
16c4a0df73527f70ffe238648ec8b22beed94cbdbc25ea082f77a60f6dbf0334
-
SHA512
040a852d1216f1531e5bd7cd0e852a9ebb90c928af87de30749c42334c33a434c026b3908e2ed502b53067773e8315c3549afee54326b189937f74cc649cc7d1
-
SSDEEP
3072:EL676SzxFMIBccgBLNsC2/Zzv1C9UK2QeA2GevDmeFoVcDYZyOi/E//8o7waxY84:EL67bz8sjn1K2Qw7cc04O319XDFaSapF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-04_10ff97cd8b6daef6430bf688ba806db3_mafia
Files
-
2024-10-04_10ff97cd8b6daef6430bf688ba806db3_mafia.exe windows:5 windows x86 arch:x86
4e7f1b19ab8e458902400f51481e2892
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
kernel32
SetFilePointer
IsValidLocale
ExitProcess
FindResourceA
LoadResource
GetCurrentProcess
WaitForSingleObject
FindResourceExA
GetLastError
SetLastError
GetProcAddress
LockResource
GetModuleHandleA
CreateThread
IsBadReadPtr
VirtualAlloc
LoadLibraryA
VirtualProtect
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapFree
EncodePointer
DecodePointer
RaiseException
IsProcessorFeaturePresent
GetModuleHandleW
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
RtlUnwind
MultiByteToWideChar
ReadFile
SetHandleCount
GetFileType
DeleteCriticalSection
CloseHandle
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
CreateFileA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
SetEndOfFile
GetProcessHeap
WriteConsoleW
LCMapStringW
GetStringTypeW
CreateFileW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ