Static task
static1
Behavioral task
behavioral1
Sample
57b3a293040dc1a6a3e92391d93184c8_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
57b3a293040dc1a6a3e92391d93184c8_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
57b3a293040dc1a6a3e92391d93184c8_mafia_JC.exe
-
Size
2.1MB
-
MD5
57b3a293040dc1a6a3e92391d93184c8
-
SHA1
b04cee126f04f30bb82657fa196acc9ce8a8e019
-
SHA256
aeaa06e1170c40d39162c73dd3cf25489ec0bcb740e965a6d31bfed12c13c6ba
-
SHA512
06cd4aff9ecc7719849a376c1b2440a06d40ca3415a923fa1a26b9f359d9c0de373952d72a2390c1124d33332c5035b50e9a09db492334aef7d58bc12617a098
-
SSDEEP
49152:Sc6tJFd5lBtMp9B1ZP7gg50r0n5/znbX7PJDz3pVO6pBfLP8rIdhOMRL5wyOKSeI:CtJFd5lBtMp9B1ZP7gg50r0n5/znbX7e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57b3a293040dc1a6a3e92391d93184c8_mafia_JC.exe
Files
-
57b3a293040dc1a6a3e92391d93184c8_mafia_JC.exe.exe windows x86
9ac33cbccc78e13b0da169db9edb70f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
LoadLibraryExW
GetLocaleInfoW
FreeLibrary
GetProcAddress
GetModuleHandleW
GlobalAlloc
lstrcmpW
GlobalLock
WideCharToMultiByte
MultiByteToWideChar
SetLastError
DeactivateActCtx
GetProcessHeap
GetLastError
LoadLibraryW
ActivateActCtx
CompareStringA
WritePrivateProfileStringA
GetPrivateProfileStringA
MoveFileExW
DeviceIoControl
ProcessIdToSessionId
GetUserDefaultLangID
SetCurrentDirectoryW
GetComputerNameExW
FindNextFileW
GetSystemDefaultLCID
FlushViewOfFile
LockResource
GlobalMemoryStatusEx
CreatePipe
WaitForMultipleObjects
TryEnterCriticalSection
GetEnvironmentVariableW
PeekNamedPipe
CreateDirectoryW
OpenMutexW
GetSystemTime
GetLocalTime
ResetEvent
OpenEventW
TerminateThread
GetExitCodeProcess
GetExitCodeThread
GetDiskFreeSpaceExW
CreateProcessW
InterlockedCompareExchange
GetSystemDefaultUILanguage
ConvertDefaultLocale
GetDateFormatW
GetTimeFormatW
QueryPerformanceFrequency
UnmapViewOfFile
ReleaseMutex
MapViewOfFile
CreateFileMappingW
CreateMutexW
GetLongPathNameW
OpenProcess
OutputDebugStringW
ExpandEnvironmentStringsW
SizeofResource
LoadResource
OpenFileMappingW
InitializeCriticalSection
GetUserDefaultUILanguage
GetModuleFileNameW
GetCurrentThreadId
GetCurrentThread
GlobalDeleteAtom
lstrcmpA
CloseHandle
SetThreadPriority
ResumeThread
WaitForSingleObject
SetEvent
CreateEventW
GetPrivateProfileIntW
WritePrivateProfileStringW
lstrlenW
GetPrivateProfileStringW
GlobalAddAtomW
GetCurrentProcessId
MulDiv
LocalFree
FormatMessageW
GlobalUnlock
GlobalSize
CopyFileW
GlobalFree
FreeResource
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringW
GetVersionExW
GlobalFindAtomW
CreateActCtxW
ReleaseActCtx
InterlockedDecrement
GetCurrentDirectoryW
GetSystemDirectoryW
lstrcpyW
GlobalFlags
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
FindResourceW
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
DeleteFileW
GlobalGetAtomNameW
GetFileAttributesW
GetFileSize
CreateFileW
lstrcmpiW
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileW
GetVolumeInformationW
GetFullPathNameW
GetShortPathNameW
lstrlenA
FileTimeToSystemTime
SetErrorMode
GetTempFileNameW
GetTempPathW
GetFileAttributesExW
SetFileAttributesW
FileTimeToLocalFileTime
GetFileSizeEx
GetFileTime
SearchPathW
GetTickCount
GetProfileIntW
Sleep
GetWindowsDirectoryW
GetNumberFormatW
VirtualProtect
GetUserDefaultLCID
FindResourceExW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
HeapAlloc
HeapFree
RtlUnwind
ExitProcess
ExitThread
CreateThread
HeapReAlloc
RaiseException
HeapQueryInformation
HeapSize
GetSystemTimeAsFileTime
VirtualAlloc
GetSystemInfo
VirtualQuery
SetStdHandle
GetFileType
SetUnhandledExceptionFilter
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapCreate
HeapDestroy
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetEnvironmentVariableA
user32
IntersectRect
BringWindowToTop
TranslateAcceleratorW
SetClassLongW
SetParent
CreatePopupMenu
NotifyWinEvent
SetWindowRgn
CreateAcceleratorTableW
LoadAcceleratorsW
DestroyAcceleratorTable
GetAsyncKeyState
CharUpperW
GetKeyboardState
GetKeyboardLayout
MapVirtualKeyW
ToUnicodeEx
CopyAcceleratorTableW
DestroyMenu
PostThreadMessageW
LoadMenuW
KillTimer
SetTimer
InvalidateRect
RealChildWindowFromPoint
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
GetSysColorBrush
SetLayeredWindowAttributes
GetSystemMetrics
EnumDisplayMonitors
SetRectEmpty
DeleteMenu
WaitMessage
ReleaseCapture
LoadCursorW
WindowFromPoint
SetCapture
ClientToScreen
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
InflateRect
IsRectEmpty
LockWindowUpdate
GetCursorPos
InsertMenuItemW
GetKeyState
IsWindowVisible
GetActiveWindow
CheckDlgButton
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
EnumChildWindows
RegisterClipboardFormatW
DrawStateW
OpenClipboard
CopyImage
SetClipboardData
CloseClipboard
EmptyClipboard
GetMenuItemInfoW
UnregisterClassW
DrawIconEx
DrawEdge
DrawFrameControl
GetPropW
RemovePropW
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
IsIconic
DestroyIcon
LoadImageW
ReuseDDElParam
UnpackDDElParam
MonitorFromPoint
DispatchMessageW
TranslateMessage
GetMessageW
CallNextHookEx
SetWindowsHookExW
SetCursor
ShowOwnedPopups
MessageBoxW
IsWindowEnabled
GetLastActivePopup
GetWindowLongW
GetWindowThreadProcessId
DrawFocusRect
SetRect
SetCursorPos
GetSystemMenu
PeekMessageW
UnionRect
RemoveMenu
GetSubMenu
GetMenuItemCount
InsertMenuW
SendMessageCallbackW
MsgWaitForMultipleObjects
AllowSetForegroundWindow
ExitWindowsEx
CloseDesktop
OpenDesktopW
SetThreadDesktop
GetThreadDesktop
SetProcessWindowStation
GetProcessWindowStation
CloseWindowStation
OpenWindowStationW
WaitForInputIdle
MsgWaitForMultipleObjectsEx
GetMenuItemID
ValidateRect
AppendMenuW
GetMenuStringW
EndDialog
GetNextDlgTabItem
GetDlgItem
IsWindow
DestroyWindow
CreateDialogIndirectParamW
SetActiveWindow
GetDesktopWindow
GetWindow
PtInRect
CopyRect
SetWindowPos
SetWindowLongW
GetMenu
CallWindowProcW
DefWindowProcW
GetDlgCtrlID
GetWindowPlacement
SetWindowPlacement
SetScrollInfo
GetScrollInfo
DeferWindowPos
EqualRect
ScreenToClient
GetWindowRect
AdjustWindowRectEx
GetSysColor
RegisterClassW
GetClassInfoW
EnableScrollBar
UpdateLayeredWindow
IsMenu
SetMenuDefaultItem
GetMenuDefaultItem
IsCharLowerW
GetClassInfoExW
CreateWindowExW
GetKeyNameTextW
MapVirtualKeyExW
IsClipboardFormatAvailable
DefFrameProcW
DefMDIChildProcW
DrawMenuBar
TranslateMDISysAccel
FrameRect
GetUpdateRect
CharUpperBuffW
CopyIcon
SubtractRect
InvertRect
HideCaret
GetIconInfo
GetNextDlgGroupItem
CreateMenu
GetDoubleClickTime
MapDialogRect
DrawIcon
GetWindowRgn
DestroyCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
ModifyMenuW
GetMenuState
EnableWindow
SendMessageW
PostMessageW
PostQuitMessage
IsZoomed
RedrawWindow
MessageBeep
FlashWindowEx
wsprintfW
GetClientRect
UpdateWindow
ShowScrollBar
SetForegroundWindow
GetScrollPos
SetScrollPos
GetScrollRange
SetScrollRange
SetMenu
TrackPopupMenu
ScrollWindow
MapWindowPoints
GetMonitorInfoW
MonitorFromWindow
GetMessagePos
OffsetRect
SystemParametersInfoW
CheckMenuItem
EnableMenuItem
gdi32
SetPixelV
GetTextFaceW
EnumFontFamiliesExW
SetPaletteEntries
ExtFloodFill
GetViewportOrgEx
GetBoundsRect
FrameRgn
FillRgn
PtInRegion
LPtoDP
GetWindowOrgEx
GetSystemPaletteEntries
GetNearestPaletteIndex
GetPaletteEntries
CreatePalette
Rectangle
DPtoLP
SetRectRgn
Polygon
Ellipse
Polyline
CreateEllipticRgn
GetBkColor
CreatePolygonRgn
CreateDIBSection
SetPixel
StretchBlt
CombineRgn
RealizePalette
GetDIBits
PatBlt
SetDIBColorTable
GetTextExtentPoint32W
GetTextColor
CreateRoundRectRgn
GetRgnBox
OffsetRgn
CreateHatchBrush
GetObjectType
SelectPalette
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetPixel
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
SetLayout
GetLayout
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
GetTextCharsetInfo
EnumFontFamiliesW
GetTextMetricsW
BitBlt
CreateCompatibleDC
CreateRectRgnIndirect
CreateCompatibleBitmap
CreateFontIndirectW
CreatePatternBrush
CreateSolidBrush
CreatePen
GetStockObject
CreateDIBitmap
GetObjectW
SetBkColor
SetTextColor
CreateDCW
CopyMetaFileW
GetDeviceCaps
CreateBitmap
DeleteObject
msimg32
GradientFill
TransparentBlt
AlphaBlend
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
BackupEventLogW
CloseEventLog
OpenEventLogW
FreeSid
AllocateAndInitializeSid
CreateProcessAsUserW
ChangeServiceConfigW
QueryServiceConfigW
ControlService
StartServiceW
QueryServiceStatus
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegQueryInfoKeyW
GetUserNameW
CheckTokenMembership
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyW
RegQueryValueW
RegEnumValueW
RegEnumKeyExW
shell32
ShellExecuteExW
ShellExecuteW
SHGetFileInfoW
ExtractIconW
SHGetSpecialFolderPathW
DragQueryFileW
DragFinish
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetDesktopFolder
CommandLineToArgvW
SHGetFolderPathW
SHAppBarMessage
comctl32
InitCommonControlsEx
ImageList_GetIconSize
shlwapi
PathIsFileSpecW
PathRemoveFileSpecW
PathIsUNCW
PathStripToRootW
PathFindFileNameW
PathFindExtensionW
ole32
OleUninitialize
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
OleInitialize
IsAccelerator
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
CoInitializeEx
OleGetClipboard
DoDragDrop
OleLockRunning
CLSIDFromString
StringFromGUID2
CreateStreamOnHGlobal
CoInitializeSecurity
CoUninitialize
CoInitialize
CoCreateInstance
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
CoCreateGuid
OleTranslateAccelerator
oleaut32
VarBstrFromDate
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantCopy
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysFreeString
gdiplus
GdipCreateBitmapFromScan0
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipGetImageWidth
GdipDeleteGraphics
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStream
GdipCloneImage
GdipLoadImageFromStream
GdipDisposeImage
GdipAlloc
GdipFree
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdipCreateBitmapFromHBITMAP
GdipDrawImageI
GdipGetImageGraphicsContext
GdiplusShutdown
GdipGetImageHeight
GdiplusStartup
oleacc
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
imm32
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
winmm
PlaySoundW
psapi
EnumProcessModules
GetModuleFileNameExW
EnumProcesses
GetModuleBaseNameW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
secur32
GetUserNameExW
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 304KB - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 412KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ