Static task
static1
Behavioral task
behavioral1
Sample
71f651d04f01020030870f966ade2586_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
71f651d04f01020030870f966ade2586_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
71f651d04f01020030870f966ade2586_mafia_JC.exe
-
Size
2.3MB
-
MD5
71f651d04f01020030870f966ade2586
-
SHA1
85db7cd654c2ed57f1633066666caf089ba1e3e7
-
SHA256
617ff53a4078e26d9ba880b22adc46e56d31d0303bf72b4305fbd7a8d0681cea
-
SHA512
060a73fe809f64cf7897e9e6ee18ba850e920d644a4a3a5f97256f95b81a6a6a47f5871f31d4280cec41a8724d023731665246d51a870dd4760c0c9c89480a80
-
SSDEEP
49152:a5Zp6SIguuBR5+s5PvDwpPtwHvehhFGT8iBaqBe4yZSERu9Wn1abnssUrOd/cSuG:a5qSfuunv0pPWehhFaBpBe4011frrO9L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71f651d04f01020030870f966ade2586_mafia_JC.exe
Files
-
71f651d04f01020030870f966ade2586_mafia_JC.exe.exe windows x86
c5941ec274b8976f4909a6f92cc41435
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAWaitForMultipleEvents
send
WSAStartup
WSACleanup
gethostbyname
accept
listen
WSACloseEvent
getsockname
setsockopt
__WSAFDIsSet
closesocket
WSACreateEvent
socket
bind
recv
sendto
WSAEventSelect
htons
WSAEnumNetworkEvents
WSAGetLastError
htonl
inet_addr
connect
ioctlsocket
WSAResetEvent
select
kernel32
GetModuleHandleA
EnterCriticalSection
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
CreatePipe
ReadFile
GetProcessTimes
GetSystemTimeAsFileTime
SetHandleInformation
GetCurrentProcess
GetExitCodeProcess
CreateProcessW
OpenEventW
GetStdHandle
Sleep
WriteFile
WaitForSingleObject
GetCommandLineW
GetUserDefaultUILanguage
GlobalMemoryStatusEx
GetVersionExW
GetNativeSystemInfo
GetProcAddress
GetProcessHeap
HeapFree
HeapAlloc
LocalFree
CloseHandle
SetLastError
GetLastError
CreateFileW
GetSystemDirectoryW
GetModuleHandleW
FreeLibrary
InterlockedCompareExchange
SetEnvironmentVariableA
GetDriveTypeW
SetStdHandle
WriteConsoleW
CompareStringW
InterlockedExchange
HeapReAlloc
GetTimeZoneInformation
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileA
GetFullPathNameA
SetFilePointer
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
GetModuleFileNameA
RtlUnwind
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
ExitProcess
HeapSize
HeapCreate
IsProcessorFeaturePresent
RaiseException
GetLocaleInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
MapViewOfFile
UnmapViewOfFile
VirtualQuery
ProcessIdToSessionId
CreateFileMappingW
OpenFileMappingW
GetCurrentProcessId
LoadLibraryW
IsWow64Process
WideCharToMultiByte
MultiByteToWideChar
SetEvent
ReleaseSemaphore
ResetEvent
CreateSemaphoreW
CreateEventW
DeleteCriticalSection
GetTickCount
lstrlenA
QueryPerformanceCounter
QueryPerformanceFrequency
lstrlenW
CreateMutexW
PeekNamedPipe
SystemTimeToFileTime
FormatMessageW
FileTimeToSystemTime
SetThreadPriority
FlushFileBuffers
OpenMutexW
WaitForMultipleObjects
ReleaseMutex
FileTimeToLocalFileTime
ResumeThread
SetEnvironmentVariableW
GetModuleHandleExW
CreateDirectoryW
GetCurrentThread
CopyFileW
GetFileAttributesW
GetModuleFileNameW
FindClose
GetFileAttributesExW
GetWindowsDirectoryW
DeleteFileW
SetEndOfFile
SetFilePointerEx
GetFileInformationByHandle
GetCurrentThreadId
GetCurrentDirectoryW
GetProcessAffinityMask
SetThreadAffinityMask
InterlockedDecrement
GetSystemDirectoryA
lstrcmpiW
GetSystemDefaultLangID
DeviceIoControl
DecodePointer
EncodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
ExitThread
CreateThread
MoveFileW
GetDriveTypeA
FindFirstFileExA
user32
EnumDisplayDevicesW
EnumDisplaySettingsW
GetSystemMetrics
EnumDisplaySettingsExW
advapi32
CryptGetHashParam
CryptAcquireContextW
CryptReleaseContext
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
CryptHashData
CryptDestroyHash
CryptCreateHash
RegSetValueExW
RegCreateKeyExW
SetEntriesInAclW
SetSecurityDescriptorDacl
ConvertStringSidToSidW
InitializeSecurityDescriptor
RegQueryValueExW
shell32
SHGetFolderPathW
CommandLineToArgvW
shlwapi
PathCombineW
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiSetDeviceInstallParamsW
SetupDiDestroyDriverInfoList
SetupDiEnumDriverInfoW
SetupDiGetDeviceInstallParamsW
SetupDiBuildDriverInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiGetDriverInstallParamsW
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
winhttp
WinHttpAddRequestHeaders
WinHttpReadData
WinHttpCrackUrl
WinHttpOpen
WinHttpOpenRequest
WinHttpSetOption
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpQueryDataAvailable
ole32
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoCreateGuid
StringFromGUID2
CoInitialize
oleaut32
SafeArrayGetElement
VariantChangeType
VariantCopy
VariantClear
SysStringLen
SysFreeString
VariantInit
SafeArrayGetLBound
SysAllocString
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 680KB - Virtual size: 684KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE