Static task
static1
Behavioral task
behavioral1
Sample
d026a84a7655914104e6f1065f154462_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d026a84a7655914104e6f1065f154462_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
d026a84a7655914104e6f1065f154462_mafia_JC.exe
-
Size
666KB
-
MD5
d026a84a7655914104e6f1065f154462
-
SHA1
5a39237fec4fc188c99d0946d48ce772e94456be
-
SHA256
e989ccbde95ccb47ba140f6eb94013e6515b210dde50bd960cc78128a8fbf999
-
SHA512
a35207b23c76fa54e4e5e90e41a2343d3692208f92e9f36ddbdd86441f80466cde89473006a93c8ce830e885d724c1ef444c0c8c27a268d828edb2da1c9ef3fa
-
SSDEEP
12288:/LoMOjwjmbJLYAuGBbAPUXwLPrQ8+nOASjdQMpYGqqqbpqkdqqqqqEqqqqqqq5dv:kMOMjDXUXwLPc8+nOp+MpcnrTOY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d026a84a7655914104e6f1065f154462_mafia_JC.exe
Files
-
d026a84a7655914104e6f1065f154462_mafia_JC.exe.exe windows x86
79d083ae62cc6ccdf5c7981b201596ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateSolidBrush
GetStockObject
SetTextColor
SetBkColor
SetBkMode
CreateCompatibleDC
SelectObject
GetObjectA
BitBlt
DeleteDC
SetMapMode
SetWindowExtEx
SetViewportExtEx
SetWindowOrgEx
SetViewportOrgEx
CreateRectRgnIndirect
DeleteObject
advapi32
RegOpenKeyExW
RegFlushKey
RegEnumKeyExW
RegDeleteKeyW
RegQueryValueExW
RegSetValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExW
user32
CallWindowProcA
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetFocus
GetWindowRect
MapWindowPoints
SetWindowPos
GetActiveWindow
MessageBoxA
GetMessageA
TranslateMessage
DispatchMessageA
WinHelpA
SetWindowLongA
GetWindowLongA
WaitForInputIdle
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
MessageBeep
MessageBoxW
TileWindows
SendInput
VkKeyScanA
EnumWindows
GetDesktopWindow
GetForegroundWindow
FindWindowA
GetWindowThreadProcessId
SetForegroundWindow
GetClassNameA
GetWindowModuleFileNameW
GetParent
EnumChildWindows
PostMessageA
SendMessageA
MoveWindow
DestroyWindow
ShowWindowAsync
SetWindowTextW
GetWindowTextW
DefWindowProcA
RegisterClassA
CreateWindowExA
IsWindowVisible
ShowWindow
GetClientRect
shell32
ShellExecuteW
oleaut32
DispGetIDsOfNames
SafeArrayCreate
SysFreeString
GetActiveObject
LoadTypeLibEx
UnRegisterTypeLi
LoadRegTypeLi
LHashValOfNameSys
VariantClear
VariantInit
SysStringLen
VariantTimeToSystemTime
VariantChangeType
VariantCopyInd
SystemTimeToVariantTime
VariantCopy
SafeArrayPutElement
SafeArrayGetElement
SafeArrayCreateVector
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetDim
SysAllocStringLen
SafeArrayDestroy
psapi
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
shlwapi
SHDeleteKeyA
ole32
StringFromCLSID
CLSIDFromProgID
ProgIDFromCLSID
CLSIDFromString
CoCreateInstance
MkParseDisplayName
CreateBindCtx
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemFree
StringFromIID
CoLockObjectExternal
CoTaskMemAlloc
OleRegGetUserType
CreateOleAdviseHolder
OleInitialize
mpr
WNetGetConnectionW
kernel32
SetEnvironmentVariableA
GetProcessHeap
SetEndOfFile
GetDriveTypeW
WriteConsoleW
SetStdHandle
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
CompareStringW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTimeZoneInformation
SetFilePointer
LoadLibraryW
InterlockedExchange
GetFileAttributesA
LCMapStringW
PeekNamedPipe
GetFileInformationByHandle
GetFileType
SetHandleCount
DeleteCriticalSection
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetLocaleInfoW
IsProcessorFeaturePresent
GetModuleFileNameW
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
GetCurrentThreadId
ExitThread
InterlockedDecrement
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
DuplicateHandle
ExitProcess
GetModuleHandleW
RemoveDirectoryA
CreateDirectoryA
FindNextFileA
GetCurrentDirectoryW
HeapReAlloc
FindFirstFileExA
FindClose
EncodePointer
DecodePointer
HeapAlloc
HeapFree
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetCommandLineA
CreateProcessA
DeleteFileA
FreeLibrary
GetModuleHandleA
ReadDirectoryChangesW
GetDiskFreeSpaceExA
GetDriveTypeA
GetLogicalDriveStringsW
CreateFileW
GetShortPathNameW
CreateNamedPipeA
ConnectNamedPipe
SetHandleInformation
CreateProcessW
SetEnvironmentVariableW
ReadFile
WriteFile
CreateThread
GetThreadPriority
SetThreadPriority
TerminateThread
ResumeThread
SuspendThread
GetModuleFileNameA
GetCurrentDirectoryA
InterlockedIncrement
DebugBreak
FatalAppExitA
lstrcpyW
lstrlenW
IsBadWritePtr
InitializeCriticalSection
LocalFree
FormatMessageA
GetLastError
WideCharToMultiByte
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
GetFullPathNameA
GetLogicalDrives
GetSystemInfo
ExpandEnvironmentStringsA
GetProcAddress
LoadLibraryA
Sleep
CopyFileA
OutputDebugStringA
MoveFileA
GlobalUnlock
GlobalLock
GlobalAlloc
GetStdHandle
CreatePipe
SetCommState
CloseHandle
BuildCommDCBA
GetCommState
CreateFileA
WaitForSingleObject
SetEvent
ReleaseMutex
CreateEventA
CreateMutexA
OpenProcess
TerminateProcess
GetProcessWorkingSetSize
FileTimeToSystemTime
FileTimeToLocalFileTime
GetProcessTimes
GetExitCodeProcess
GetCurrentProcessId
GetCurrentProcess
WaitForMultipleObjects
Sections
.text Size: 438KB - Virtual size: 438KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ