Static task
static1
Behavioral task
behavioral1
Sample
cb0a0bb3d573a04fd89527171ef1f0c2_mafia_JC.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
cb0a0bb3d573a04fd89527171ef1f0c2_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
cb0a0bb3d573a04fd89527171ef1f0c2_mafia_JC.exe
-
Size
232KB
-
MD5
cb0a0bb3d573a04fd89527171ef1f0c2
-
SHA1
a52492911793edec8bb593311d27cb3785d6035b
-
SHA256
f96529811b7baa637ab29b2cc84aed033b86af7b7c398aa49c8e107a35ad59e5
-
SHA512
fa47c04f193a0020c653db296b24a876a0016824d47996881da6951a6094e08b9aa6500fb5ba2796beda86e227ca585b78e218b1fadbda3c25d9486b035ac5eb
-
SSDEEP
6144:3QTX1GVoE+BMcIfivorb+oA4M2XPDBuhAo:6X45/+oAjODB6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb0a0bb3d573a04fd89527171ef1f0c2_mafia_JC.exe
Files
-
cb0a0bb3d573a04fd89527171ef1f0c2_mafia_JC.exe.exe windows x86
0578f468871acb6ca0cf9a5fe51395c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
CreateFileW
WriteFile
FlushFileBuffers
GetFileSize
ReadFile
SetFilePointer
LoadLibraryW
GetProcAddress
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
ReleaseMutex
SetEndOfFile
CopyFileW
GetCurrentThreadId
FileTimeToLocalFileTime
FileTimeToSystemTime
DeviceIoControl
GetTickCount
CreateFileA
SetLastError
WriteConsoleW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
TlsFree
TlsSetValue
TlsGetValue
GetProcessHeap
HeapAlloc
MultiByteToWideChar
GetCurrentProcess
IsWow64Process
Sleep
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
SizeofResource
CloseHandle
TerminateProcess
GetCurrentProcessId
GetLastError
GetLongPathNameW
GetModuleHandleW
GetModuleFileNameW
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
GetStdHandle
ExitProcess
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
LockResource
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
RaiseException
HeapSize
HeapDestroy
HeapReAlloc
SetStdHandle
user32
ShowWindow
UpdateWindow
SetTimer
PostQuitMessage
KillTimer
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadStringW
DefWindowProcW
LoadAcceleratorsW
advapi32
FreeSid
AllocateAndInitializeSid
RegQueryInfoKeyW
RegOpenKeyW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
LookupAccountSidW
winhttp
WinHttpCrackUrl
WinHttpOpen
WinHttpSetTimeouts
WinHttpConnect
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpReadData
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ