Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_96e1942f6ac3d5314b1a1b8f8c97aa3c_mafia.exe
Resource
win7-20240903-en
General
-
Target
2024-10-14_96e1942f6ac3d5314b1a1b8f8c97aa3c_mafia
-
Size
2.3MB
-
MD5
96e1942f6ac3d5314b1a1b8f8c97aa3c
-
SHA1
89fa1fc5a877c60379a2293c46197bbb15da290c
-
SHA256
4e6e71f45bce8851f80f58a6a1e313202dafad8d0706d74f8532e49d23c80e81
-
SHA512
5b923c4086ff11451f6f210c83ace54448b59e87409f9b900afffe708c11566c444afa0c856d3a542cdffdbe6201fa17fa6dfd6c5ba73b9a3b466cfb9dda3449
-
SSDEEP
49152:XpEUgw14kZV2HXsMnmjEREseBSsxHnfXsrHYi2YijiNDmg27RnWGj:fwYJYjD527BWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-14_96e1942f6ac3d5314b1a1b8f8c97aa3c_mafia
Files
-
2024-10-14_96e1942f6ac3d5314b1a1b8f8c97aa3c_mafia.exe windows:5 windows x86 arch:x86
136bea86936e01e1f983ef31dafa8b2a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SizeofResource
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetShortPathNameW
SetLastError
GetFileAttributesW
SetFileAttributesW
LoadResource
LocalFree
GetProcessHeap
SetEndOfFile
CreateProcessA
GetExitCodeProcess
FindResourceW
GetEnvironmentVariableW
CreateDirectoryW
Sleep
Process32NextW
TerminateProcess
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
WaitForSingleObject
CreateProcessW
GetTickCount
lstrlenW
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
CloseHandle
DeviceIoControl
CreateFileW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentProcessId
GetNativeSystemInfo
GetCurrentProcess
GetVersionExW
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileAttributesA
SetStdHandle
LoadLibraryW
SetEnvironmentVariableA
GetTimeZoneInformation
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLocaleInfoW
HeapFree
GetCPInfo
HeapAlloc
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
ExitProcess
DeleteFileW
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
LCMapStringW
CompareStringW
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetACP
GetOEMCP
IsValidCodePage
ReadFile
WriteFile
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
SetFilePointer
user32
MessageBoxW
GetSystemMetrics
advapi32
AllocateAndInitializeSid
SetNamedSecurityInfoW
SetEntriesInAclW
GetNamedSecurityInfoW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ControlService
QueryServiceStatus
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
FreeSid
shell32
SHGetFolderPathW
psapi
GetModuleFileNameExW
EnumProcessModules
shlwapi
StrStrIW
wintrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
CryptCATAdminReleaseContext
CryptCATAdminCalcHashFromFileHandle
WinVerifyTrust
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
Sections
.text Size: 438KB - Virtual size: 437KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE