Static task
static1
Behavioral task
behavioral1
Sample
641e1e3214dfbf6657081f056e2da401_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
641e1e3214dfbf6657081f056e2da401_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
641e1e3214dfbf6657081f056e2da401_mafia_JC.exe
-
Size
302KB
-
MD5
641e1e3214dfbf6657081f056e2da401
-
SHA1
617c30aff79775b5d3fd759a94907a555da5e5ef
-
SHA256
f97dfb064dfdfc75146c8060cdfe0904125787787181218f4f0ca06c748639ab
-
SHA512
61b3f005b6a8f11e2b623c98406a70bb89f988eec48dec4d4ef3f7a48b4956b6556709e2bcbbb7445b00f6ebe0b09fb88223c462599c864d68ebf3742233d138
-
SSDEEP
6144:osvPKk2ATHCSwrF8cpwYxxoa5SOLgkk000/00Jh6Og:NKXATxGFgYvxQOLgkk000/00Jtg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 641e1e3214dfbf6657081f056e2da401_mafia_JC.exe
Files
-
641e1e3214dfbf6657081f056e2da401_mafia_JC.exe.exe windows x86
dd1efbdf43dc792e7734f0f02da9226c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetTapeParameters
GetModuleHandleW
GetConsoleAliasesA
GetPriorityClass
IsProcessInJob
ReadConsoleInputA
InitAtomTable
LocalHandle
lstrlenW
WritePrivateProfileStringW
GetProfileIntA
SetCurrentDirectoryA
GetProcAddress
FindVolumeMountPointClose
EnumDateFormatsExA
FlushConsoleInputBuffer
IsWow64Process
GetCommMask
GetModuleHandleA
GetFileInformationByHandle
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
VirtualQuery
lstrlenA
SetProcessAffinityMask
SetCalendarInfoW
LocalUnlock
GetCPInfo
GetLocaleInfoW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
RtlUnwind
Sleep
HeapSize
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
IsValidLocale
user32
GetKeyboardLayoutNameA
keybd_event
EnumPropsExA
SendInput
GetMessageExtraInfo
GetClassLongW
CreateIconIndirect
SetDlgItemInt
ScrollDC
EnumDisplaySettingsW
gdi32
GetEnhMetaFileHeader
CreatePenIndirect
DPtoLP
ExtFloodFill
winspool.drv
DeviceCapabilitiesA
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ