Static task
static1
Behavioral task
behavioral1
Sample
c6a6684b813ee385ab654060b2937bbb_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c6a6684b813ee385ab654060b2937bbb_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
c6a6684b813ee385ab654060b2937bbb_mafia_JC.exe
-
Size
626KB
-
MD5
c6a6684b813ee385ab654060b2937bbb
-
SHA1
198dd200465cadd99be2396f21b00adcb10d8c24
-
SHA256
269a67238cb4b7fddf9744c2649c6a6e8e0255261732bde4a74d721e6daebeb9
-
SHA512
580c256365cfc9ecfce8c80c0293b04870d11e8c1b14384b6346f34d396db4889c7cf8a9529e30d4ada2ac3ffff2ae2b6ed692cfeb56eac0fb33992b7e4f6e78
-
SSDEEP
12288:3uD42HCWjL7787iRjPN0VpqQPdKqLHi5EJSA0I:+D4ICWL78wj20jQIA2I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c6a6684b813ee385ab654060b2937bbb_mafia_JC.exe
Files
-
c6a6684b813ee385ab654060b2937bbb_mafia_JC.exe.exe windows x86
96645e0fbfdc24c1325731182cf5248b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateProcessW
CreateThread
MultiByteToWideChar
FileTimeToSystemTime
FileTimeToLocalFileTime
CreateDirectoryW
GetCommandLineW
ReadFile
GetFileSize
GetFileTime
CreateFileW
GetLastError
WriteFile
GetNativeSystemInfo
GetVersionExW
GetTickCount
DeleteFileW
lstrlenA
WideCharToMultiByte
lstrlenW
GetProcAddress
LoadLibraryW
FreeLibrary
OpenMutexW
CreateMutexW
ReleaseMutex
RaiseException
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
SetEvent
SetUnhandledExceptionFilter
OutputDebugStringW
GetModuleFileNameW
LocalFree
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleW
SetEnvironmentVariableA
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
CompareStringW
SetLastError
GetConsoleMode
GetConsoleCP
SetFilePointer
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetTimeZoneInformation
GetStdHandle
ExitProcess
HeapCreate
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStartupInfoW
HeapSetInformation
GetDateFormatW
GetTimeFormatW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
RtlUnwind
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
DeleteCriticalSection
EnterCriticalSection
WaitForSingleObject
TerminateThread
CloseHandle
LeaveCriticalSection
InitializeCriticalSection
FindResourceExW
FindResourceW
FlushInstructionCache
LoadResource
LockResource
SizeofResource
GetCurrentProcess
GetStringTypeW
user32
CreateWindowExW
SendMessageW
GetWindowTextW
GetWindowTextLengthW
SetFocus
CreateAcceleratorTableW
GetFocus
LoadIconW
GetParent
CallWindowProcW
GetWindowLongW
DefWindowProcW
FindWindowExW
DestroyWindow
IsWindow
GetDlgCtrlID
SetWindowLongW
SendMessageTimeoutW
GetWindowThreadProcessId
DestroyAcceleratorTable
GetDesktopWindow
FillRect
ReleaseCapture
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetMessageW
LoadImageW
GetKeyState
AnimateWindow
EnumWindows
RegisterWindowMessageW
EnumChildWindows
GetForegroundWindow
SetTimer
PostQuitMessage
UnregisterClassA
KillTimer
EndPaint
BeginPaint
GetDlgItem
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ClientToScreen
CharNextW
GetSysColor
GetSystemMetrics
SystemParametersInfoW
GetClassInfoExW
GetWindow
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
IsWindowVisible
ShowWindow
ScreenToClient
GetClientRect
GetWindowRect
SetWindowPos
MoveWindow
SetWindowTextW
PostMessageW
SetForegroundWindow
AttachThreadInput
MessageBoxW
GetClassNameW
LoadCursorW
RegisterClassExW
gdi32
DeleteObject
GetDeviceCaps
SelectObject
GetObjectW
GetStockObject
DeleteDC
CreateCompatibleBitmap
CreateSolidBrush
BitBlt
CreateCompatibleDC
shell32
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteW
ole32
CoGetClassObject
CoUninitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
OleLockRunning
StringFromGUID2
CoReleaseServerProcess
CoAddRefServerProcess
CoCreateInstance
CoInitialize
oleaut32
OleCreateFontIndirect
LoadTypeLi
LoadRegTypeLi
DispCallFunc
SysAllocStringLen
SysAllocString
VariantClear
VariantInit
SysStringLen
SysFreeString
shlwapi
SHSetValueW
PathStripPathW
PathRemoveExtensionW
StrToIntExW
StrToIntW
PathQuoteSpacesW
PathFileExistsW
SHGetValueW
PathAddExtensionW
PathAppendW
urlmon
URLDownloadToFileW
comctl32
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
oleacc
AccessibleObjectFromWindow
AccessibleChildren
ObjectFromLresult
wininet
HttpSendRequestW
HttpAddRequestHeadersW
InternetReadFile
InternetCloseHandle
InternetConnectW
InternetOpenW
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestW
Sections
.text Size: 420KB - Virtual size: 420KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ