Static task
static1
Behavioral task
behavioral1
Sample
f72d6563abc7e610e9d0850b8fdfeb71_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f72d6563abc7e610e9d0850b8fdfeb71_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
f72d6563abc7e610e9d0850b8fdfeb71_mafia_JC.exe
-
Size
2.2MB
-
MD5
f72d6563abc7e610e9d0850b8fdfeb71
-
SHA1
fe4e235efbcfa0488e8a0e0133c18aba0cfa5dd3
-
SHA256
863a8ce4b92ddb5563824c6dad2b4033c89b61bd617aadbd78ef86e5bd1b574a
-
SHA512
6e881c61e28b7e04b6617632ea7d3550b9445bc21b0441c60b6c482761d79a604b400d8334b2dfc985f29154ba466d0a92c2230719d94cf73335eae4c811a0cd
-
SSDEEP
49152:VpBz7DjVRVzH/KP29NJoT41TG1vRJw9My3fmJ:VpB/VRVzHye9iI3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f72d6563abc7e610e9d0850b8fdfeb71_mafia_JC.exe
Files
-
f72d6563abc7e610e9d0850b8fdfeb71_mafia_JC.exe.exe windows x86
a603cfd706268ca8076b5787de716968
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
CreateIpForwardEntry
GetAdaptersInfo
kernel32
InitializeCriticalSection
DeleteCriticalSection
LockResource
LoadResource
SizeofResource
FindResourceA
GetLocalTime
GetModuleFileNameA
FindClose
FindNextFileA
FindFirstFileA
GetTickCount
Sleep
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleA
lstrcmpiA
IsDBCSLeadByte
LoadLibraryExA
CloseHandle
CreateProcessA
GetFullPathNameA
OutputDebugStringA
CreateEventA
SetEvent
ResetEvent
WaitForSingleObject
GetVersion
WaitForMultipleObjects
GetCurrentThread
ResumeThread
SetCommState
SetCommMask
PurgeComm
GetOverlappedResult
WaitForSingleObjectEx
WriteFile
EscapeCommFunction
ReadFile
ClearCommError
WaitCommEvent
SetCommTimeouts
GetCommTimeouts
SetupComm
GetCommState
CreateFileA
GetCurrentDirectoryA
GetStdHandle
SetNamedPipeHandleState
WaitNamedPipeA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
OpenEventA
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetLocaleInfoA
GetSystemDirectoryA
GetWindowsDirectoryA
CreateSemaphoreA
GetFileAttributesExA
QueryPerformanceCounter
QueryPerformanceFrequency
InterlockedExchange
FormatMessageA
lstrlenW
SetEnvironmentVariableW
GetDriveTypeA
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
LoadLibraryW
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetModuleFileNameW
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CompareStringW
GetDateFormatA
GetTimeFormatA
GetCPInfo
LCMapStringW
FindFirstFileExA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeZoneInformation
GetFileType
SetStdHandle
ExitProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineA
CreateThread
ExitThread
VirtualQuery
GetModuleHandleW
VirtualProtect
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
GetStringTypeW
GetLocaleInfoW
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
PostQueuedCompletionStatus
lstrcpynW
lstrlenA
lstrcpynA
GetVersionExA
LoadLibraryA
FreeLibrary
GetProcAddress
GetLastError
SetLastError
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
CreateIoCompletionPort
GetQueuedCompletionStatus
InterlockedExchangeAdd
GetSystemInfo
RaiseException
GetCurrentDirectoryW
user32
SetWindowPos
MapWindowPoints
GetClientRect
GetMonitorInfoA
UnregisterClassA
MonitorFromWindow
GetWindowRect
GetWindow
SetWindowLongA
PostMessageA
MessageBoxA
TranslateAcceleratorA
GetClassInfoExA
GetParent
DefWindowProcA
CallWindowProcA
RegisterClassExA
CreateWindowExA
DialogBoxParamA
GetActiveWindow
SendMessageA
InvalidateRect
CreatePopupMenu
AppendMenuA
RemoveMenu
SetMenuItemInfoA
GetMenuItemInfoA
SetMenuDefaultItem
LoadStringA
SetFocus
PostQuitMessage
LoadStringW
GetMenuItemCount
DestroyMenu
MonitorFromPoint
TrackPopupMenuEx
MessageBeep
IsWindow
PtInRect
PeekMessageA
SetDlgItemTextA
GetWindowLongA
EndDialog
LoadCursorA
CharToOemA
OemToCharA
RegisterWindowMessageA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
GetMenuItemID
GetSubMenu
KillTimer
EndPaint
BeginPaint
LoadMenuA
LoadAcceleratorsA
LoadImageA
DestroyWindow
CharNextA
GetMessageA
TranslateMessage
DispatchMessageA
ShowWindow
wvsprintfA
LoadIconA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
GetUserNameA
CryptGenRandom
CryptAcquireContextA
CryptReleaseContext
RegEnumValueA
RegCloseKey
RegQueryInfoKeyW
RegSetValueExA
RegDeleteKeyA
shell32
ShellExecuteExA
SHGetFolderPathA
Shell_NotifyIconA
ole32
CoTaskMemAlloc
CoCreateGuid
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoInitialize
CoUninitialize
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
secur32
FreeCredentialsHandle
FreeContextBuffer
InitializeSecurityContextA
AcquireCredentialsHandleA
DeleteSecurityContext
ws2_32
getservbyname
ntohs
ntohl
recv
bind
listen
WSASend
WSARecv
WSAAccept
WSASocketA
getsockopt
getsockname
htonl
inet_ntoa
WSASetLastError
gethostbyname
send
connect
getpeername
shutdown
closesocket
setsockopt
ioctlsocket
WSAStartup
WSACleanup
select
__WSAFDIsSet
socket
WSAGetLastError
htons
inet_addr
Sections
.text Size: 917KB - Virtual size: 916KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ