@mctraxer@0
@shutting@0
Static task
static1
Behavioral task
behavioral1
Sample
8f37126c2aeb160eae109ee9371af841_mafia_JC.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
8f37126c2aeb160eae109ee9371af841_mafia_JC.exe
Resource
win10v2004-20230824-en
Target
8f37126c2aeb160eae109ee9371af841_mafia_JC.exe
Size
3.8MB
MD5
8f37126c2aeb160eae109ee9371af841
SHA1
27b0b73093a8be6dd4e14dfecf24b17bb0030979
SHA256
13695895cc67645c4266ee080b8980e1ba142090e303827e9798b7c269ded5f6
SHA512
37776858bd14dfcb7c8e3a97cd6c0a3a1846bb1a0c17772e6f94ab7880f20f0107a84a6fd12fd6d48260ff04e003349205a13f5e2bb17daa43500a1c983e2515
SSDEEP
98304:a8xMpv3AZEJFyoqRZgKeSNRmp9nVnKlrfGcv2IJaLf7sakL7xBG:7mpvAekozS2nVKlrf3v29LY9vH
Checks for missing Authenticode signature.
resource |
---|
8f37126c2aeb160eae109ee9371af841_mafia_JC.exe |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RtlCaptureContext
HeapAlloc
DeleteVolumeMountPointA
SetThreadExecutionState
SetCommBreak
GetTickCount
GlobalAlloc
SizeofResource
GetSystemWindowsDirectoryA
EnumSystemCodePagesA
FindNextVolumeW
GetAtomNameW
lstrlenA
MultiByteToWideChar
DisconnectNamedPipe
FindFirstFileExA
SetVolumeLabelW
LoadLibraryA
ProcessIdToSessionId
IsWow64Process
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
VirtualProtect
CompareStringA
GetCurrentProcessId
WriteConsoleOutputCharacterW
IsBadStringPtrW
IsDBCSLeadByte
SetupComm
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
SetFilePointer
CloseHandle
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
CreateFileA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleW
CreateFileW
EnumServicesStatusA
RegisterEventSourceA
RegQueryValueExW
@mctraxer@0
@shutting@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE