Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_06de9fe90574d029338d634b7f61487e_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_06de9fe90574d029338d634b7f61487e_mafia_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_06de9fe90574d029338d634b7f61487e_mafia_JC.exe
-
Size
323KB
-
MD5
06de9fe90574d029338d634b7f61487e
-
SHA1
cf5c3b95b2c41a7054ea11d66f506aaf1250040e
-
SHA256
db6eb338f89cfa5b909c6a61f296fd189d2bd6a16b5aa8739dd38942e3604e04
-
SHA512
e49ce59b30f1ac02bab881bda64bf1b456394a2242f03da3395041159114ae7ee42efbcd7b21ad79f4410c384abe5d928c8c4681137c4ad874ae766b4a34be1a
-
SSDEEP
6144:zlM8nfoHRnI5/oR8HYVx0eYJ9fBbHxoF5vLRNy+dw3mR:zlM8nfoHFGg/FYJHWLLRNy+d8m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_06de9fe90574d029338d634b7f61487e_mafia_JC.exe
Files
-
2023-08-22_06de9fe90574d029338d634b7f61487e_mafia_JC.exe.exe windows x86
f4604e12c1ece65b6ed40d9222a69536
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryDosDeviceA
GetFileAttributesA
CopyFileA
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
GetPrivateProfileIntA
GetPrivateProfileStringA
InitializeCriticalSection
DeleteCriticalSection
CreateEventA
LoadLibraryA
SetEvent
ResetEvent
GetComputerNameA
EnterCriticalSection
LeaveCriticalSection
CreateProcessA
OpenEventA
GetModuleFileNameA
GetUserDefaultLangID
OutputDebugStringA
WideCharToMultiByte
CreateDirectoryA
GetLogicalDriveStringsA
ResumeThread
SetErrorMode
IsDebuggerPresent
CreateFileMappingA
GetCurrentProcessId
ExitProcess
SetFilePointer
WritePrivateProfileStringA
GetFullPathNameA
CreateFileW
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetStdHandle
FlushFileBuffers
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
GetStringTypeW
IsValidLocale
RemoveDirectoryA
FindClose
FindNextFileA
Sleep
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
WriteFile
TerminateProcess
GetCurrentProcess
SetLastError
ReadFile
GetFileSize
FindResourceA
FindFirstFileA
SetFileAttributesA
DeleteFileA
CreateFileA
GetTickCount
GetModuleHandleA
CloseHandle
GetProcAddress
SizeofResource
LoadResource
LocalFree
GetLocalTime
GetLastError
WaitForSingleObject
CreateMutexA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
LoadLibraryW
GetCurrentDirectoryW
IsValidCodePage
GetOEMCP
GetACP
HeapDestroy
HeapCreate
GetStartupInfoW
GetFileType
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
HeapSize
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
RtlUnwind
RaiseException
HeapSetInformation
GetCommandLineA
GetCurrentThreadId
MoveFileA
MultiByteToWideChar
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
ExitThread
CreateThread
HeapReAlloc
HeapAlloc
HeapFree
GetDriveTypeW
GetSystemTimeAsFileTime
user32
DispatchMessageA
PeekMessageA
TranslateMessage
EnumDisplayMonitors
EnumDisplaySettingsA
GetSystemMetrics
GetMonitorInfoA
advapi32
OpenSCManagerA
CloseServiceHandle
OpenServiceA
GetExplicitEntriesFromAclA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
GetAce
GetAclInformation
AddAce
InitializeAcl
IsValidSid
GetLengthSid
LookupAccountNameA
CopySid
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ws2_32
htons
socket
WSACleanup
WSAStartup
bind
setsockopt
recvfrom
WSAGetLastError
closesocket
gethostname
gethostbyname
inet_ntoa
inet_addr
connect
ioctlsocket
select
htonl
listen
accept
recv
send
sendto
wininet
InternetCrackUrlA
psapi
GetProcessImageFileNameA
shlwapi
PathFileExistsA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Sections
.text Size: 251KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ