Static task
static1
Behavioral task
behavioral1
Sample
5eea7753c0f9133b2c132f6c0518b2e6_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5eea7753c0f9133b2c132f6c0518b2e6_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5eea7753c0f9133b2c132f6c0518b2e6_mafia_JC.exe
-
Size
3.8MB
-
MD5
5eea7753c0f9133b2c132f6c0518b2e6
-
SHA1
264d54e9ebe013a949262a46260f05738ebe0068
-
SHA256
f0b18d7a68407447db26f031c81b5a1b834178fd2787912a7c99d4df1281e4b1
-
SHA512
053c65de49adc64e1999f173734f11c468f03b789ea90c0f57c104d2cfdeafee68696e12460d9fe222aa2b3fd3286171bb69efff292fe9633475f029c31d95ec
-
SSDEEP
49152:G9yiCJ5rFwnANZGEXep+9TxFegOSDAmosh3ANkTTlMd2YtzMyxq7olHq2pG:1J5rFwnApezgOS9V3AMOd2C9zl3U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5eea7753c0f9133b2c132f6c0518b2e6_mafia_JC.exe
Files
-
5eea7753c0f9133b2c132f6c0518b2e6_mafia_JC.exe.exe windows x86
fcdcf4239ade4bb66e6f89d5914ca08e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
DeleteFileA
VirtualFree
GetEnvironmentVariableA
VirtualAlloc
CreateFileMappingA
SetFileTime
GetFileAttributesA
GetFileAttributesW
ReadFile
CreateFileW
lstrcatA
DeviceIoControl
lstrcpyW
SetLastError
GetComputerNameA
FindResourceA
FreeResource
LoadResource
WaitForSingleObject
GetProcessHeap
GetSystemWow64DirectoryA
SizeofResource
CreateEventA
CreateProcessA
GetSystemDirectoryA
ResetEvent
GetLocalTime
GetExitCodeThread
LockResource
GetSystemInfo
WinExec
FreeLibrary
IsBadReadPtr
LoadLibraryA
VirtualProtect
GetModuleHandleW
GetSystemDirectoryW
LoadLibraryW
GetCurrentThreadId
InterlockedIncrement
ExpandEnvironmentStringsA
LocalAlloc
ResumeThread
SetFilePointer
SystemTimeToFileTime
CreateDirectoryA
GetCurrentDirectoryA
LocalFileTimeToFileTime
GetDriveTypeA
GetPrivateProfileStringA
GetFileSize
WaitNamedPipeW
ReadProcessMemory
SetNamedPipeHandleState
VirtualFreeEx
VirtualAllocEx
SleepEx
lstrlenW
CreateProcessW
WriteProcessMemory
VirtualProtectEx
lstrcpyA
GetVersionExW
GetCurrentDirectoryW
GetModuleFileNameW
GetVersion
VirtualQueryEx
GetCurrentThread
CreateRemoteThread
GetWindowsDirectoryW
CreateFileMappingW
CreateMutexW
OpenMutexW
OpenFileMappingW
CreateEventW
OpenEventW
ExitThread
FlushInstructionCache
ReleaseMutex
GetThreadContext
InterlockedCompareExchange
SetEndOfFile
GetDriveTypeW
SetEnvironmentVariableA
CompareStringW
GetTimeZoneInformation
InterlockedExchange
GetStringTypeW
GetFullPathNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
LocalFree
FormatMessageA
GetTickCount
lstrlenA
FileTimeToLocalFileTime
CreateToolhelp32Snapshot
Process32Next
lstrcmpiA
FileTimeToSystemTime
GetProcessTimes
Process32First
WriteFile
WaitNamedPipeA
GetSystemTime
OpenFileMappingA
GetCurrentProcessId
CloseHandle
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GetLastError
MultiByteToWideChar
TerminateProcess
Sleep
WideCharToMultiByte
OpenProcess
FlushViewOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileA
ExitProcess
OutputDebugStringA
DeleteCriticalSection
AddVectoredExceptionHandler
EnterCriticalSection
HeapCreate
LeaveCriticalSection
InitializeCriticalSection
HeapFree
GetCurrentProcess
HeapAlloc
VirtualQuery
LCMapStringW
GetConsoleMode
GetConsoleCP
GetStartupInfoW
SetHandleCount
InitializeCriticalSectionAndSpinCount
SetStdHandle
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
InterlockedDecrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
FindFirstFileExA
HeapSetInformation
GetCommandLineA
HeapReAlloc
GetStdHandle
WriteConsoleW
GetFileType
PeekNamedPipe
GetFileInformationByHandle
MoveFileA
CreateThread
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
DuplicateHandle
user32
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
wsprintfA
CharNextA
GetParent
EnumWindows
PeekMessageA
GetSystemMetrics
GetWindowThreadProcessId
GetMessageA
TranslateMessage
DispatchMessageA
CloseDesktop
advapi32
OpenSCManagerA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetLengthSid
GetKernelObjectSecurity
AllocateAndInitializeSid
FreeSid
GetTokenInformation
LookupPrivilegeValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyW
RegDeleteKeyW
CreateServiceW
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
QueryServiceStatus
ChangeServiceConfigW
StartServiceW
ControlService
OpenProcessToken
QueryServiceStatusEx
StartServiceA
CreateServiceA
EnumDependentServicesA
DeleteService
CloseServiceHandle
OpenServiceA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyA
BuildExplicitAccessWithNameA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
SetNamedSecurityInfoA
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
shell32
ShellExecuteExA
SHFileOperationA
shlwapi
PathIsDirectoryA
PathIsRootA
PathFindFileNameA
PathStripToRootA
PathFileExistsA
PathRemoveFileSpecA
PathAddBackslashA
psapi
GetMappedFileNameA
ws2_32
getsockname
htons
inet_addr
connect
gethostname
WSACleanup
WSAStartup
WSAGetLastError
recv
send
socket
ntohs
bind
getsockopt
getpeername
WSASetLastError
freeaddrinfo
getaddrinfo
__WSAFDIsSet
select
ioctlsocket
closesocket
setsockopt
gethostbyname
imagehlp
CheckSumMappedFile
iphlpapi
GetAdaptersInfo
Sections
.text Size: 995KB - Virtual size: 994KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cpp0 Size: 577KB - Virtual size: 577KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 386KB - Virtual size: 385KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ