Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_304c5d52f169281a7134db806a6def1c_mafia_JC.exe
Resource
win7-20230831-en
General
-
Target
2023-08-22_304c5d52f169281a7134db806a6def1c_mafia_JC.exe
-
Size
950KB
-
MD5
304c5d52f169281a7134db806a6def1c
-
SHA1
f21d76d288a3dd1b50d0634101da9785672cf696
-
SHA256
496fd0423b0a00bf00486549e058ff48df4b9c9fe32d885dbe5e50e584b6cb2f
-
SHA512
7aa034010000df2c2f94019e986073bc981c9889d1254d035e34c9384cec60d189ff4198198fd3576be889991186d0621be13237bc33e88e710fc5bedb7387df
-
SSDEEP
24576:oD4OKJX25wlOgISubXvo6AxraGec1KPMEw4AFpiR9dRzc:oDKO8uDvAlaGec1KPMerd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_304c5d52f169281a7134db806a6def1c_mafia_JC.exe
Files
-
2023-08-22_304c5d52f169281a7134db806a6def1c_mafia_JC.exe.exe windows x86
4ca58140d2c0a3d0669db11c5a1ddfde
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetNamedSecurityInfoW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
kernel32
SetEndOfFile
GetProcessHeap
GetCommandLineW
SetStdHandle
WriteConsoleW
GetCurrentProcess
CloseHandle
InterlockedDecrement
WaitForSingleObject
CreateSemaphoreA
ReleaseSemaphore
GetLastError
SetLastError
CreateMutexA
ReleaseMutex
CreateProcessW
FreeLibrary
GetProcAddress
LoadLibraryW
GetVersionExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteFileW
CreateFileW
CopyFileW
FileTimeToLocalFileTime
GetFileTime
SetFileAttributesW
LocalFree
CreateDirectoryW
WideCharToMultiByte
MultiByteToWideChar
GetACP
CreateEventA
SetEvent
GetLongPathNameW
GetTempPathW
InterlockedIncrement
InterlockedExchange
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsValidLocale
HeapSetInformation
GetStartupInfoW
HeapFree
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
RtlUnwind
RaiseException
GetCPInfo
LCMapStringW
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetLocaleInfoW
HeapSize
GetOEMCP
IsValidCodePage
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
oleaut32
VariantClear
shlwapi
PathIsFileSpecW
PathFileExistsW
PathRemoveFileSpecW
Sections
.text Size: 283KB - Virtual size: 283KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 596KB - Virtual size: 600KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE