Static task
static1
Behavioral task
behavioral1
Sample
310e2b5c0de9098fb72fa02f4841affa_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
310e2b5c0de9098fb72fa02f4841affa_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
310e2b5c0de9098fb72fa02f4841affa_mafia_JC.exe
-
Size
232KB
-
MD5
310e2b5c0de9098fb72fa02f4841affa
-
SHA1
7a9b24ce9624b037c4ce773ab90bf35a1794df3f
-
SHA256
7c598c632d342209041fe8e9cf38bacd06b355d6ee79c9e2636ece876a8e9e9b
-
SHA512
22a57ccf25e32f7e0e08291d5823579dc3c273bf8da298ea2b488cf0f37f62459b6ed72d76185c1eb24ca9ece7d75f73985cfe689d3d6d7a984c8ebf6ee7c3c7
-
SSDEEP
6144:lAnXdkVFMGh2ECfivirL+oAYM2XPzhN8G3:kMC7t+oADuzhS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 310e2b5c0de9098fb72fa02f4841affa_mafia_JC.exe
Files
-
310e2b5c0de9098fb72fa02f4841affa_mafia_JC.exe.exe windows x86
0578f468871acb6ca0cf9a5fe51395c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
CreateFileW
WriteFile
FlushFileBuffers
GetFileSize
ReadFile
SetFilePointer
LoadLibraryW
GetProcAddress
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
ReleaseMutex
SetEndOfFile
CopyFileW
GetCurrentThreadId
FileTimeToLocalFileTime
FileTimeToSystemTime
DeviceIoControl
GetTickCount
CreateFileA
SetLastError
WriteConsoleW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
TlsFree
TlsSetValue
TlsGetValue
GetProcessHeap
HeapAlloc
MultiByteToWideChar
GetCurrentProcess
IsWow64Process
Sleep
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
SizeofResource
CloseHandle
TerminateProcess
GetCurrentProcessId
GetLastError
GetLongPathNameW
GetModuleHandleW
GetModuleFileNameW
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
GetStdHandle
ExitProcess
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
LockResource
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
RaiseException
HeapSize
HeapDestroy
HeapReAlloc
SetStdHandle
user32
ShowWindow
UpdateWindow
SetTimer
PostQuitMessage
KillTimer
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadStringW
DefWindowProcW
LoadAcceleratorsW
advapi32
FreeSid
AllocateAndInitializeSid
RegQueryInfoKeyW
RegOpenKeyW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
LookupAccountSidW
winhttp
WinHttpCrackUrl
WinHttpOpen
WinHttpSetTimeouts
WinHttpConnect
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpReadData
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ