Static task
static1
Behavioral task
behavioral1
Sample
3add58e3d1bac110a1bd36fc7be8adf7_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3add58e3d1bac110a1bd36fc7be8adf7_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
3add58e3d1bac110a1bd36fc7be8adf7_mafia_JC.exe
-
Size
558KB
-
MD5
3add58e3d1bac110a1bd36fc7be8adf7
-
SHA1
3d0f5c80f7b7eb9973905c499a37eef0987a08ff
-
SHA256
5a136c673c8e01565b748f8ba32c86759509abea75be9b7d629e4e5117a4afe3
-
SHA512
e51b11059272f8ea493703627218be2497043e23aea3a773aa21595778f9edd511a69415a75e8ef2674adb51f10356e601e2794f601e839481505c180b8e43e0
-
SSDEEP
12288:aOMGtqAfofqDeHSHtXRTgELS3+R6/xm/xqBwvLtLtQabp05VN5:DMGtqAfoqoSHtXRTVL4j5m/YwxtQabpo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3add58e3d1bac110a1bd36fc7be8adf7_mafia_JC.exe
Files
-
3add58e3d1bac110a1bd36fc7be8adf7_mafia_JC.exe.exe windows x86
976089a8b90367d669ae026ae3bfe974
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleW
lstrcmpiW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
Sleep
LockResource
FindResourceExW
Module32NextW
Module32FirstW
Process32NextW
Process32FirstW
FreeLibrary
LoadLibraryA
ResumeThread
InterlockedIncrement
CreateThread
InterlockedDecrement
RaiseException
FlushInstructionCache
SetEnvironmentVariableW
GetCommandLineW
RemoveDirectoryW
GetCurrentThreadId
DeleteFileW
UnmapViewOfFile
SetEnvironmentVariableA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
MapViewOfFile
lstrlenW
WideCharToMultiByte
CreateFileMappingW
LeaveCriticalSection
EnterCriticalSection
SetLastError
CloseHandle
GetCurrentProcess
WriteConsoleW
SetEndOfFile
SetStdHandle
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetACP
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
GetVersionExW
GetLastError
ExitProcess
GetStdHandle
SetHandleCount
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CompareStringW
LCMapStringW
FindClose
GetFileAttributesW
CreateFileW
GetFileInformationByHandle
GetFileSizeEx
GetTempPathW
GetCurrentDirectoryW
GetTempFileNameW
SetFileAttributesW
CopyFileW
MoveFileW
FindFirstFileW
WriteFile
ReadFile
SetFilePointer
CreateDirectoryW
GetDriveTypeW
GetWindowsDirectoryW
GetSystemDirectoryW
GetNativeSystemInfo
GetComputerNameW
ExpandEnvironmentStringsW
GetEnvironmentVariableW
FormatMessageW
LocalFree
GetPrivateProfileIntW
GetPrivateProfileStringW
LocalAlloc
WaitForSingleObject
InitializeCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
CreateMutexW
OpenMutexW
ReleaseMutex
GetCurrentProcessId
GlobalMemoryStatusEx
FlushFileBuffers
DeviceIoControl
LoadLibraryW
SetErrorMode
TerminateProcess
SetCurrentDirectoryW
GetCurrentThread
VirtualQuery
ReadProcessMemory
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
lstrlenA
CreateProcessW
CreatePipe
GetExitCodeProcess
GetFileSize
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InterlockedPushEntrySList
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
HeapDestroy
HeapReAlloc
HeapSize
HeapSetInformation
GetStartupInfoW
GetFullPathNameW
GetSystemTimeAsFileTime
GetFileType
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
CreateToolhelp32Snapshot
user32
DestroyMenu
AppendMenuW
ShowWindow
SendMessageW
GetSystemMenu
PostMessageW
IsWindow
MapWindowPoints
UnregisterClassA
LoadIconW
DestroyWindow
DefWindowProcW
CharNextW
DialogBoxParamW
GetActiveWindow
SetWindowLongW
GetDesktopWindow
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
SetWindowPos
GetDlgItem
SetWindowTextW
EndDialog
GetClientRect
GetParent
GetWindowRect
WaitForInputIdle
advapi32
AllocateAndInitializeSid
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
GetUserNameW
SetSecurityDescriptorDacl
CheckTokenMembership
FreeSid
RegQueryValueExW
InitializeSecurityDescriptor
ole32
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
oleaut32
VarUI4FromStr
shlwapi
AssocQueryStringW
comctl32
InitCommonControlsEx
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
netapi32
NetApiBufferFree
NetWkstaGetInfo
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
FindExecutableW
Sections
.text Size: 386KB - Virtual size: 386KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ