Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_1bc2c08b275ee4e62c49ecd752824978_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-12_1bc2c08b275ee4e62c49ecd752824978_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_1bc2c08b275ee4e62c49ecd752824978_mafia
-
Size
174KB
-
MD5
1bc2c08b275ee4e62c49ecd752824978
-
SHA1
2a919374b7c201637c5170321d72bbb9f692f7a3
-
SHA256
e776ef12700434f46631ebc5b2c003fd532788497555dd99fd92fe3f3aec3d68
-
SHA512
aee3aee49a8442b78b93ab0d8d081d3260325e3d3e3c874ea77fbdec04e6e54a50688ba00e2eaa29459993dc9780490a53b268263aec82e43b0102b13cae5b06
-
SSDEEP
3072:Mqzk4JdfHKqgHw7KnAVVoy5pP1bKf0yVpPO2M0Z0qps3br46JH/8M:Mqzk4JdfqqwTyVX5bsG2M0Nps3gaf8M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-12_1bc2c08b275ee4e62c49ecd752824978_mafia
Files
-
2024-10-12_1bc2c08b275ee4e62c49ecd752824978_mafia.exe windows:5 windows x86 arch:x86
c06fed78b42ab569c8991327cc2c8525
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetSetOptionW
HttpAddRequestHeadersW
HttpQueryInfoW
InternetAttemptConnect
InternetOpenW
InternetConnectW
InternetReadFile
InternetCrackUrlW
InternetSetOptionExW
HttpSendRequestW
HttpOpenRequestW
InternetCloseHandle
urlmon
URLDownloadToCacheFileW
kernel32
CreateFileA
FreeLibrary
GetVersionExW
GetFileAttributesW
GetTempPathW
GetProcAddress
LoadLibraryA
DeviceIoControl
CreateThread
LoadLibraryW
GetCommandLineW
SetEvent
GetTickCount
Sleep
ReadFile
InterlockedExchange
MoveFileW
ResetEvent
GetExitCodeThread
CreateEventW
ResumeThread
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
HeapCreate
GetLastError
GetCurrentProcess
LocalFree
GetCurrentProcessId
DeleteFileW
CloseHandle
ReleaseMutex
GetCurrentThreadId
GetFileAttributesExW
CreateFileW
GetModuleFileNameW
WriteFile
OutputDebugStringW
WaitForSingleObject
SetFilePointer
CreateMutexW
GetFileSize
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
SetEnvironmentVariableA
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
WriteConsoleW
SetEndOfFile
GetProcessHeap
CompareStringW
GetFileType
GetStdHandle
SetHandleCount
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetTimeZoneInformation
ExitProcess
GetModuleHandleW
HeapSize
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
HeapFree
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
user32
FindWindowExW
IsWindowVisible
advapi32
CryptHashData
RegSetValueExW
CryptDestroyHash
RegOpenKeyExW
CryptCreateHash
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExW
CryptReleaseContext
RegQueryValueExA
CryptAcquireContextW
CryptGetHashParam
RegCloseKey
ole32
CoSetProxyBlanket
CoInitialize
CoCreateInstance
CoInitializeSecurity
CoUninitialize
shell32
SHGetFolderPathW
SHCreateDirectoryExW
ShellExecuteW
CommandLineToArgvW
oleaut32
VariantClear
VariantInit
rpcrt4
UuidCreateSequential
ws2_32
WSAStartup
gethostbyname
WSACleanup
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ