Static task
static1
Behavioral task
behavioral1
Sample
e57643c66a6cbc0e2a3ea69360457c43_mafia_JC.exe
Resource
win7-20230824-en
General
-
Target
e57643c66a6cbc0e2a3ea69360457c43_mafia_JC.exe
-
Size
1.5MB
-
MD5
e57643c66a6cbc0e2a3ea69360457c43
-
SHA1
31dd83edde56faaf6653aa6aab39ee9f4ccdbe8f
-
SHA256
cccc064b45bad2754202884fe73ec77992d322d1d2b59b149308a6723efe85fa
-
SHA512
75ac581bf703203c473e9a398ff03ef4197b7914a28102fc03d06cb473469a8c22e33b5e2c2a01421baf73a6522d1535bf9c97c0a34cba6322c3e91c76e60115
-
SSDEEP
24576:9P6E73mDXEDbLSu1j09A99Jcd1aUGFRVClsUK2LdOdgqcSuJCr:9S23mYvLSqj0ejJe1abnssUrOd/cSuQr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e57643c66a6cbc0e2a3ea69360457c43_mafia_JC.exe
Files
-
e57643c66a6cbc0e2a3ea69360457c43_mafia_JC.exe.exe windows x86
d84915d3ba80fc92115335c3d6a2c07c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
RemoveDirectoryW
GetCurrentDirectoryW
CreateFileW
GetFileSize
ReadFile
MultiByteToWideChar
GetFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
LoadLibraryW
CreateMutexW
CreateThread
GetPrivateProfileStringW
GetLocalTime
GetCommandLineW
GetTickCount
SetFilePointer
WriteFile
EnumResourceLanguagesW
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersion
ConvertDefaultLocale
GetLocaleInfoW
GetVersionExW
GetCurrentProcess
GetSystemInfo
GetSystemWow64DirectoryW
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
GetExitCodeProcess
CreateEventW
SetEvent
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CompareFileTime
LocalAlloc
GetProcessHeap
SetEndOfFile
SetErrorMode
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsProcessorFeaturePresent
WriteConsoleW
SetStdHandle
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetCurrentThreadId
GetFileType
HeapCreate
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
RaiseException
GetStartupInfoW
CopyFileW
GetTempFileNameW
GetTempPathW
GetEnvironmentVariableW
GetSystemDirectoryW
GetFileAttributesW
FreeLibrary
GetProcAddress
ExitProcess
LoadLibraryExW
Sleep
SetFileAttributesW
MoveFileExW
DeleteFileW
WaitForSingleObject
CreateProcessW
SetLastError
VerifyVersionInfoW
VerSetConditionMask
GetWindowsDirectoryW
FindNextFileW
FindClose
TlsAlloc
FindFirstFileW
LocalFree
GetModuleFileNameW
GetLastError
SizeofResource
LockResource
LoadResource
FindResourceW
GetModuleHandleW
TlsSetValue
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
TlsGetValue
HeapSetInformation
GetCPInfo
GetConsoleMode
GetConsoleCP
HeapFree
HeapAlloc
DecodePointer
EncodePointer
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
WideCharToMultiByte
CloseHandle
CreateFileA
TlsFree
HeapReAlloc
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
user32
SendMessageW
GetDlgItem
wsprintfW
ShowWindow
EndDialog
DialogBoxIndirectParamW
MonitorFromWindow
GetMonitorInfoW
OffsetRect
GetWindowLongW
AdjustWindowRect
GetWindowRect
DrawTextW
LoadIconW
SetRectEmpty
PostMessageW
EnableWindow
ReleaseDC
GetDC
SetFocus
SetWindowPos
GetClientRect
SetWindowTextW
MessageBoxIndirectW
LoadImageW
SendMessageTimeoutW
ExitWindowsEx
EnumWindows
GetWindowThreadProcessId
GetWindowModuleFileNameW
LoadStringW
DialogBoxParamW
MessageBoxW
KillTimer
SendDlgItemMessageW
SetTimer
SetDlgItemTextW
gdi32
SetBkMode
SetTextColor
DeleteDC
GetTextExtentPoint32W
SelectObject
CreateCompatibleDC
DeleteObject
CreateFontW
GetStockObject
advapi32
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
RegEnumValueW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegCreateKeyExW
RegSetValueExW
IsTextUnicode
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
DeleteService
ControlService
QueryServiceConfigW
StartServiceW
CloseServiceHandle
ChangeServiceConfigW
ChangeServiceConfig2W
CreateServiceW
OpenServiceW
OpenSCManagerW
QueryServiceStatus
RegDeleteValueW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
shell32
SHCreateDirectoryExA
SHGetFolderPathW
SHCreateDirectoryExW
CommandLineToArgvW
ole32
CLSIDFromString
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
cabinet
ord22
ord23
ord20
ord21
setupapi
SetupDiSetClassInstallParamsW
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiGetINFClassW
SetupFindNextLine
SetupGetStringFieldW
SetupGetLineTextW
SetupOpenInfFileW
SetupCloseInfFile
SetupDiGetDeviceInstallParamsW
SetupFindFirstLineW
SetupDiCallClassInstaller
shlwapi
PathIsSystemFolderW
PathIsRootW
ord176
PathRenameExtensionW
PathRemoveBackslashW
PathRemoveFileSpecA
PathAddBackslashA
PathFindFileNameA
PathIsDirectoryEmptyW
SHStrDupW
PathCombineW
PathFindExtensionW
PathStripPathW
SHDeleteKeyW
PathFileExistsW
PathFindFileNameW
PathAppendA
PathRemoveFileSpecW
PathMatchSpecA
PathAppendW
PathStripToRootW
PathAddBackslashW
PathIsDirectoryW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
psapi
EnumProcessModules
GetModuleFileNameExW
Sections
.text Size: 328KB - Virtual size: 328KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 524KB - Virtual size: 523KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE