Static task
static1
Behavioral task
behavioral1
Sample
44c70bf513e63558f786eb0fc1d682ca_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
44c70bf513e63558f786eb0fc1d682ca_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
44c70bf513e63558f786eb0fc1d682ca_mafia_JC.exe
-
Size
19.7MB
-
MD5
44c70bf513e63558f786eb0fc1d682ca
-
SHA1
7655f15160abacef6db45a570f30f0ee7117dd07
-
SHA256
c0e56678a260b100d2afd5f99d22dcf4a26e6a2358aaebaf88f68bd4ea663e3f
-
SHA512
1f76a391b86dae83738070afef01757d0348d4bdf4a86ffb14037779a48716991a4a0a2d145005c54cf205428fd2422c8b2c3c95c647b3635ffe9212c9e44b72
-
SSDEEP
393216:OFugyXElouLJ9gCJnNB58mQp/1tqNJIKal3xfg8h3LsBUhJ:DgyXho9pJv56p/1tqGl3FZh3LsBUh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44c70bf513e63558f786eb0fc1d682ca_mafia_JC.exe
Files
-
44c70bf513e63558f786eb0fc1d682ca_mafia_JC.exe.exe windows x86
f70d6f69649aa8d0d0593e26a423edc6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExW
DuplicateIcon
ExtractIconExW
SHGetFolderPathW
ShellExecuteW
wsock32
WSAStartup
ntohl
htonl
socket
htons
ioctlsocket
gethostbyname
connect
recv
select
send
gdiplus
GdipLoadImageFromStream
GdipDrawImageRectI
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipAlloc
GdipFree
GdiplusShutdown
GdiplusStartup
GdipCloneImage
GdipGetImageBounds
kernel32
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapCreate
GetStdHandle
WriteFile
GetLocaleInfoW
InterlockedDecrement
GetLongPathNameW
lstrlenW
Sleep
GetCurrentProcess
FlushInstructionCache
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetLastError
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedIncrement
LoadLibraryW
MulDiv
GetCommandLineW
GetTempPathW
GetExitCodeThread
LocalFree
CreateThread
WriteProcessMemory
QueryPerformanceCounter
GetFileAttributesW
CreateFileW
LockResource
CloseHandle
GetWindowsDirectoryW
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
GetDateFormatW
IsValidLocale
FileTimeToSystemTime
SetHandleCount
WaitForSingleObject
CreateRemoteThread
OpenProcess
VirtualFreeEx
GetVersionExW
VirtualAllocEx
DeviceIoControl
GetVolumeInformationW
TlsAlloc
TlsGetValue
TlsFree
GlobalReAlloc
GetSystemDirectoryW
GetSystemTime
WideCharToMultiByte
TlsSetValue
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
GetCPInfo
RtlUnwind
GetTimeZoneInformation
FindNextFileW
FindFirstFileExW
GetDriveTypeW
FindClose
GetFullPathNameW
DeleteFileW
RemoveDirectoryW
GetStartupInfoW
HeapSetInformation
CreateDirectoryW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetSystemTimeAsFileTime
ExitProcess
InitializeCriticalSection
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetFileType
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetTickCount
GetCurrentProcessId
CompareStringW
ReadFile
SetFilePointer
GetUserDefaultLCID
GetLocaleInfoA
FileTimeToLocalFileTime
WriteConsoleW
SetStdHandle
FlushFileBuffers
SetEndOfFile
SetEnvironmentVariableA
EnumSystemLocalesA
SystemTimeToFileTime
user32
GetDialogBaseUnits
UnregisterClassA
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
ScreenToClient
EndDialog
CreateWindowExW
DefWindowProcW
SetWindowLongW
IsWindow
UpdateWindow
SetTimer
HideCaret
EndPaint
BeginPaint
GetSystemMetrics
ClientToScreen
KillTimer
EnumWindows
GetClassNameW
PostMessageW
DialogBoxIndirectParamW
SetForegroundWindow
DialogBoxParamW
FindWindowW
PostThreadMessageW
DestroyIcon
GetWindowThreadProcessId
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
FillRect
GetMessageW
MessageBoxW
CharNextW
GetWindowTextW
SetFocus
DestroyWindow
CreateDialogParamW
GetWindow
GetWindowLongW
SystemParametersInfoW
GetParent
MapWindowPoints
SetWindowPos
DispatchMessageW
InvalidateRect
ShowWindow
PeekMessageW
GetActiveWindow
gdi32
GetTextExtentPoint32W
CreateFontW
GetDeviceCaps
CreateFontIndirectW
DeleteDC
SelectObject
GetStockObject
SetBkColor
CreateSolidBrush
DeleteObject
advapi32
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
RegDeleteValueW
IsTextUnicode
ole32
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CLSIDFromString
CoInitialize
CLSIDFromProgID
CreateStreamOnHGlobal
CoSetProxyBlanket
CoInitializeSecurity
CoTaskMemFree
GetRunningObjectTable
CreateBindCtx
oleaut32
VariantClear
VariantInit
VariantChangeType
VariantCopy
SysAllocString
SysFreeString
SysStringLen
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
OleLoadPicture
CreateErrorInfo
Sections
.text Size: 246KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19.4MB - Virtual size: 19.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ