Static task
static1
Behavioral task
behavioral1
Sample
3be97aef854c4454ca8291b9fd0713c3_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3be97aef854c4454ca8291b9fd0713c3_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
3be97aef854c4454ca8291b9fd0713c3_mafia_JC.exe
-
Size
1.6MB
-
MD5
3be97aef854c4454ca8291b9fd0713c3
-
SHA1
5a85092b6fec5077d2af577a1e06ce136f14abd1
-
SHA256
47f6fec889e83141d2f168d8107e44fc6ef0039b3bfd934713cc1954d286e53e
-
SHA512
0ff1e670c39684874d9bb4a49bc4bc9e08141fce689aef4e4ac82dd7615ec5ae45179cd2e26353fc988d32c9e50f6bc55d20b5f676fd6ee73c6190dd7ba7edbc
-
SSDEEP
49152:VxmvrpBiZ5s5ISOLvepwD41y/AIqNDTHJDYCaz4tVxtN:VQBiZ5s5IDepwM1y/AIqNVw45
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3be97aef854c4454ca8291b9fd0713c3_mafia_JC.exe
Files
-
3be97aef854c4454ca8291b9fd0713c3_mafia_JC.exe.exe windows x86
22221359c5df3db50326ede15653d025
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoTaskMemAlloc
OleLockRunning
IIDFromString
CoCreateGuid
CoInitialize
CoUninitialize
OleRun
OleSetContainedObject
CoCreateInstance
CoGetClassObject
CoTaskMemFree
OleUninitialize
OleInitialize
StringFromGUID2
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoTaskMemRealloc
shell32
SHGetPathFromIDListA
CommandLineToArgvW
SHGetFolderPathW
FindExecutableA
SHGetFolderPathA
SHGetFolderLocation
SHBrowseForFolderA
wininet
InternetCrackUrlA
HttpQueryInfoA
InternetConnectA
InternetReadFile
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
InternetOpenA
InternetCloseHandle
user32
GetMessageA
PostQuitMessage
TranslateMessage
GetAncestor
DispatchMessageA
GetSystemMenu
GetClassInfoExW
RegisterClassExW
GetWindowLongW
EnableMenuItem
SetWindowLongW
ShowWindow
CreateWindowExW
AdjustWindowRectEx
SetWindowTextW
DefWindowProcW
SetTimer
GetTopWindow
GetWindowThreadProcessId
PostMessageA
SetCursor
GetWindowRect
MapDialogRect
SetForegroundWindow
PtInRect
SetWindowContextHelpId
DispatchMessageW
GetCursorPos
EnableWindow
GetDlgCtrlID
EndPaint
ClientToScreen
DestroyWindow
GetClassNameA
DestroyAcceleratorTable
ScreenToClient
RegisterClassExA
FillRect
SetRect
MapWindowPoints
GetWindowTextW
EnumWindows
KillTimer
DrawTextW
IsChild
GetClassInfoExA
SetCapture
LoadStringA
GetFocus
GetParent
InvalidateRgn
wsprintfA
CharNextA
GetClientRect
SetFocus
GetWindowTextLengthA
SendMessageA
RegisterWindowMessageA
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
MessageBoxA
MsgWaitForMultipleObjectsEx
IsWindowUnicode
PeekMessageA
GetMessageW
EndDialog
MoveWindow
GetWindow
LoadCursorA
DialogBoxIndirectParamA
CallWindowProcA
SetWindowTextA
ReleaseCapture
IsWindow
GetActiveWindow
SetWindowPos
GetSysColor
GetDesktopWindow
RedrawWindow
DefWindowProcA
GetDlgItem
ReleaseDC
UnregisterClassA
InvalidateRect
CreateAcceleratorTableA
GetWindowLongA
CreateWindowExA
urlmon
IsValidURL
comctl32
InitCommonControlsEx
wintrust
WinVerifyTrust
kernel32
HeapSetInformation
VirtualQuery
GetSystemInfo
VirtualProtect
GetStartupInfoW
DecodePointer
EncodePointer
GetStringTypeW
GetSystemTimeAsFileTime
WriteConsoleW
GetFileType
GetStdHandle
RtlUnwind
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
ExitThread
CreateThread
CreateDirectoryW
GetFullPathNameW
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
SetStdHandle
GetModuleHandleW
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
InitializeCriticalSection
SetFilePointerEx
CreateFileW
ReleaseMutex
CreateMutexA
LoadLibraryW
GetModuleHandleExA
OpenFileMappingA
CreateFileMappingA
GetCPInfo
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapCreate
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentDirectoryW
GetFileInformationByHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetTimeZoneInformation
CompareStringW
SetEnvironmentVariableA
ExitProcess
IsProcessorFeaturePresent
HeapReAlloc
InterlockedPopEntrySList
VirtualAlloc
GetCommandLineW
FindResourceA
lstrcmpA
lstrlenA
lstrcpynA
FreeLibrary
LoadResource
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GlobalLock
GetCommandLineA
GlobalAlloc
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
LeaveCriticalSection
SetDllDirectoryA
MulDiv
IsDBCSLeadByte
MultiByteToWideChar
lstrlenW
GlobalUnlock
FlushInstructionCache
RaiseException
GetLastError
SetLastError
lstrcmpiA
GetProcAddress
EnterCriticalSection
GlobalFree
LockResource
GlobalHandle
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
DeleteCriticalSection
GetCurrentThreadId
lstrcpyA
GetTickCount
CreateEventA
lstrcatA
GetVersionExA
GetCurrentProcessId
GetTempPathA
DeleteFileA
CreateFileA
ReadFile
CloseHandle
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
FindResourceW
Process32First
WriteFile
GetSystemDirectoryA
CreateDirectoryA
Process32Next
MoveFileA
CreateToolhelp32Snapshot
LocalFree
SetEvent
SystemTimeToFileTime
FileTimeToSystemTime
FormatMessageA
InterlockedExchange
InterlockedExchangeAdd
LocalAlloc
Sleep
LoadLibraryExW
WaitForSingleObject
GetNativeSystemInfo
GetModuleHandleExW
GetWindowsDirectoryA
GetSystemWow64DirectoryA
GetLogicalProcessorInformation
FlushViewOfFile
GetLocaleInfoA
OpenProcess
TerminateProcess
FindFirstFileA
FindClose
LoadLibraryA
MoveFileExA
GetDriveTypeA
GetFileAttributesA
RemoveDirectoryA
SetFileAttributesA
FindNextFileA
FormatMessageW
GetLocalTime
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetSystemTime
QueryPerformanceCounter
QueryPerformanceFrequency
OpenThread
GetExitCodeThread
PeekNamedPipe
SetHandleInformation
GetExitCodeProcess
CreateProcessA
CreatePipe
MapViewOfFile
UnmapViewOfFile
VirtualFree
advapi32
RegSetValueExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryInfoKeyW
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenCurrentUser
RegOpenKeyA
RegEnumKeyA
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CryptCreateHash
CryptDestroyHash
CryptHashData
OpenProcessToken
ConvertSidToStringSidA
GetTokenInformation
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorA
oleaut32
SysAllocString
SysStringLen
VariantClear
LoadTypeLi
VariantInit
SysAllocStringLen
OleCreateFontIndirect
VarUI4FromStr
SysFreeString
LoadRegTypeLi
VariantCopy
VariantChangeType
GetErrorInfo
SysStringByteLen
shlwapi
PathIsDirectoryEmptyA
PathAppendA
ord12
gdi32
SelectObject
DeleteObject
GetDeviceCaps
DeleteDC
CreateCompatibleDC
SetBkMode
SetTextColor
CreateFontIndirectA
CreateCompatibleBitmap
GetObjectA
GetStockObject
BitBlt
CreateSolidBrush
crypt32
CryptStringToBinaryA
CryptUnprotectData
CryptProtectData
CryptBinaryToStringA
msi
ord168
ord160
ord158
ord115
ord159
ord87
ord8
ord204
ord117
ord91
ord189
ord67
ord31
ord137
ord44
ord141
version
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoSizeA
Sections
.text Size: 576KB - Virtual size: 576KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 777KB - Virtual size: 777KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ