Static task
static1
Behavioral task
behavioral1
Sample
237bbc34258685fa65571f5c43a132a4_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
237bbc34258685fa65571f5c43a132a4_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
237bbc34258685fa65571f5c43a132a4_mafia_JC.exe
-
Size
596KB
-
MD5
237bbc34258685fa65571f5c43a132a4
-
SHA1
554924946661e4dad545581c3eec5943242907df
-
SHA256
4fb82888d003282a88f116d744998d7b2b2279ecb2b7676e27e75bbe28695ae1
-
SHA512
1b0e787b8cc15491b37cff92b7e8e7d1286fedff7c1ecf152bf6fe9c621eeb90334d7921060da877b2d02e7b8600c43ef570ffcf3527d41563928b93a53f2ffc
-
SSDEEP
12288:ytGNrlcHtfv6AIvZFu0Y90WTx/teUPP6X9p8zmDWRJ5pffGZJlbHF:yYRlcdxlkSr59SlbH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 237bbc34258685fa65571f5c43a132a4_mafia_JC.exe
Files
-
237bbc34258685fa65571f5c43a132a4_mafia_JC.exe.exe windows x86
4a40a8522665b7abe023a27bc857f5c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetModuleFileNameW
GetModuleFileNameA
OutputDebugStringA
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
CreateThread
SetLastError
GetLastError
GetCurrentProcess
GetTickCount
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetProcessHeap
SetEndOfFile
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
LCMapStringW
WriteConsoleW
SetStdHandle
CreateFileA
HeapReAlloc
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
HeapCreate
SetFilePointer
ReadFile
SetCurrentDirectoryA
FreeConsole
GetConsoleTitleA
AllocConsole
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryW
InterlockedExchange
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
HeapSize
CloseHandle
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetLocaleInfoW
GetStdHandle
WriteFile
IsProcessorFeaturePresent
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
DecodePointer
EncodePointer
GetProcAddress
GetModuleHandleW
ExitProcess
HeapFree
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
RaiseException
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
user32
SetDlgItemTextA
GetDlgItemTextA
FindWindowA
SetWindowTextA
DispatchMessageA
RemoveMenu
ShowWindow
EndDialog
GetDlgItem
GetWindowLongA
MessageBoxA
SetWindowLongA
TranslateMessage
SendMessageA
LoadIconA
SendDlgItemMessageA
PostQuitMessage
CreateDialogParamA
SetTimer
GetSystemMenu
GetMessageA
comctl32
InitCommonControlsEx
wsock32
socket
connect
send
recv
closesocket
htons
WSAStartup
WSAGetLastError
setsockopt
ioctlsocket
gethostbyname
Sections
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ