Static task
static1
Behavioral task
behavioral1
Sample
5098d5a26cc42097c88828bd8f9dc0e8_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5098d5a26cc42097c88828bd8f9dc0e8_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5098d5a26cc42097c88828bd8f9dc0e8_mafia_JC.exe
-
Size
349KB
-
MD5
5098d5a26cc42097c88828bd8f9dc0e8
-
SHA1
6fb9ddc9987651111169d6692938e21a229d4c08
-
SHA256
f1b58775ec1766f0c0d5568a6f941f5520c41abc2284993411be4dbf16a470aa
-
SHA512
6a9f29f81a86e8b93a16d41af89abbcdc8c94a3ae47e14f6dc33b27d4710c830fc1ffdb9fbc0ca71960d481b07b981dd0f58a9b514e4fefaf0533ff30b099384
-
SSDEEP
6144:rxrXHnwSCNm2aDwcvl/UvG55or6JSYqAOa8Nj/xFOLIxAEBtp88FFEeKyQyeig8y:rxrXHnwS2m2aDwcvl/UvG55or6gYyL74
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5098d5a26cc42097c88828bd8f9dc0e8_mafia_JC.exe
Files
-
5098d5a26cc42097c88828bd8f9dc0e8_mafia_JC.exe.exe windows x86
2c2aff551c77f0fec5682f1b4867b3f7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveFileSpecW
PathAppendW
winmm
timeGetTime
kernel32
GetSystemDirectoryW
ReadProcessMemory
GetFileAttributesW
TerminateProcess
GetCurrentDirectoryW
VirtualProtectEx
GetExitCodeThread
DuplicateHandle
GetCurrentProcessId
WriteProcessMemory
CreateFileW
LocalAlloc
DeviceIoControl
GetCurrentThreadId
GetVersion
VirtualQuery
IsBadReadPtr
GetProcAddress
CreateFileMappingW
HeapAlloc
HeapFree
GetCurrentThread
GetProcessHeap
CreateRemoteThread
VirtualQueryEx
VirtualFreeEx
VirtualAllocEx
VirtualProtect
CreateFileA
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
HeapSize
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTickCount
GetCurrentProcess
UnmapViewOfFile
MapViewOfFile
Module32NextW
Module32FirstW
AttachConsole
SetLastError
SetHandleCount
FreeConsole
CreateThread
InterlockedExchange
FlushFileBuffers
DisconnectNamedPipe
ReadFile
TerminateThread
WriteFile
CreateNamedPipeW
ConnectNamedPipe
WaitForSingleObject
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
GetModuleFileNameA
Process32FirstW
OpenProcess
GetModuleHandleW
LocalFree
DeleteCriticalSection
EnterCriticalSection
GetLastError
GetModuleFileNameW
LeaveCriticalSection
FormatMessageW
CopyFileW
Sleep
InitializeCriticalSection
GetCommandLineW
SetStdHandle
SetEndOfFile
SetEnvironmentVariableA
GetEnvironmentStringsW
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
RaiseException
WideCharToMultiByte
PeekNamedPipe
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
GetLocaleInfoW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteConsoleW
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapReAlloc
GetCPInfo
RtlUnwind
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringW
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetStdHandle
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetFileType
user32
GetWindowTextW
MessageBoxW
GetWindowThreadProcessId
EnumWindows
advapi32
OpenServiceW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetKernelObjectSecurity
AdjustTokenPrivileges
LookupPrivilegeValueW
GetTokenInformation
OpenProcessToken
RegEnumKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExW
RegCloseKey
QueryServiceConfigW
ControlService
ReportEventW
UnlockServiceDatabase
RegOpenKeyExW
SetServiceStatus
ChangeServiceConfigW
QueryServiceStatus
StartServiceW
LookupAccountNameW
RegDeleteKeyW
DeregisterEventSource
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
RegisterServiceCtrlHandlerExW
GetUserNameW
StartServiceCtrlDispatcherW
OpenSCManagerW
DeleteService
CloseServiceHandle
RegisterEventSourceW
CreateServiceW
shell32
CommandLineToArgvW
SHGetFolderPathW
Sections
.text Size: 274KB - Virtual size: 273KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ