Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_419e7f8075311ba4ff1909fb39cf82d1_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_419e7f8075311ba4ff1909fb39cf82d1_mafia_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_419e7f8075311ba4ff1909fb39cf82d1_mafia_JC.exe
-
Size
549KB
-
MD5
419e7f8075311ba4ff1909fb39cf82d1
-
SHA1
208ddf9767ea918aff1ba5bba813a0069ebf5e43
-
SHA256
1701342d5f98f339f22d91d21c45399a716f00a897d40cc5dcd093966f33246e
-
SHA512
21f809e780e52529b55ee7b674ef59316700bcf6e9d68a79ac2ce072fc5caea4e25cac54cecd1f5c7df636217f02da14f7fed09814e30542ce17ca2ed6ed29d0
-
SSDEEP
12288:2ff0r4QCQMmjcLfIMiBUooJtUCLCRZuQcStFsSo:2fyraIivJuCLCRZuQlFsSo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_419e7f8075311ba4ff1909fb39cf82d1_mafia_JC.exe
Files
-
2023-08-22_419e7f8075311ba4ff1909fb39cf82d1_mafia_JC.exe.exe windows x86
ccffccd8e777379060f4bc3facc30d52
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingA
SystemTimeToFileTime
WaitForSingleObject
GetTickCount
CreateProcessA
GetShortPathNameA
GetFileTime
GetSystemTime
GetLogicalDriveStringsA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetTimeZoneInformation
GetLocalTime
GetVersionExA
VirtualFree
FormatMessageA
VirtualAlloc
GetDiskFreeSpaceA
LocalFree
GetFileSize
GetWindowsDirectoryA
FileTimeToSystemTime
GetEnvironmentVariableA
FindFirstFileA
FindClose
FindNextFileA
lstrlenA
FileTimeToLocalFileTime
TerminateThread
ResumeThread
CreateThread
WriteFile
ExitProcess
Sleep
CreateMutexA
ReleaseMutex
OpenFileMappingA
GetExitCodeProcess
TerminateProcess
LocalAlloc
ExpandEnvironmentStringsA
GlobalAlloc
GlobalFree
GetSystemDefaultLangID
lstrcmpiA
GetSystemInfo
InterlockedDecrement
GetCurrentProcess
DecodePointer
EncodePointer
GetDriveTypeW
GetFullPathNameA
GetSystemTimeAsFileTime
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
GetVersion
FindFirstFileExA
GetModuleHandleW
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnmapViewOfFile
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetLocaleInfoW
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
LCMapStringW
HeapCreate
HeapSize
SetHandleCount
InitializeCriticalSectionAndSpinCount
RtlUnwind
ReadFile
GetCurrentDirectoryW
GetConsoleCP
LoadLibraryW
InterlockedExchange
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
SetFilePointer
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetStdHandle
FlushFileBuffers
SetEndOfFile
CompareStringW
SetEnvironmentVariableA
GetDiskFreeSpaceExA
GetModuleHandleA
GetModuleFileNameA
GetPrivateProfileStringA
VerLanguageNameA
GetLastError
MultiByteToWideChar
CreateFileW
GetSystemDirectoryA
OpenFile
LocalHandle
OutputDebugStringA
GetVolumeInformationA
WideCharToMultiByte
GetDriveTypeA
GetProcessHeap
GetLogicalDrives
HeapFree
HeapAlloc
SetErrorMode
CloseHandle
DeviceIoControl
CreateFileA
LoadLibraryA
MapViewOfFile
UnhandledExceptionFilter
DeleteFileA
GetProcAddress
FreeLibrary
GetFileAttributesA
GetComputerNameA
user32
DestroyWindow
CharUpperA
GetKeyboardLayoutNameA
GetKeyboardType
GetSystemMetrics
ReleaseDC
GetDC
LoadCursorA
DispatchMessageA
ShowWindow
DefWindowProcA
CreateWindowExA
UnregisterClassA
MessageBoxA
CharLowerA
wsprintfA
GetMessageA
LoadStringA
TranslateMessage
RegisterWindowMessageA
SetTimer
RegisterClassExA
UpdateWindow
PostQuitMessage
SendMessageA
FindWindowExA
KillTimer
gdi32
GetStockObject
GetDeviceCaps
winspool.drv
EnumPrintersA
EnumPrinterDriversA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegCloseKey
OpenServiceA
CloseServiceHandle
StartServiceA
OpenSCManagerA
ControlService
QueryServiceStatus
EnumServicesStatusA
RegEnumValueA
QueryServiceConfigA
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegQueryValueExA
ole32
CoUninitialize
CoInitialize
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
SafeArrayGetUBound
SafeArrayGetElement
SysAllocStringByteLen
SafeArrayGetLBound
SysStringLen
SysFreeString
VariantClear
SysAllocString
zlibvc
ord80
ord81
ord84
ord82
ord83
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
imagehlp
MapFileAndCheckSumA
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailA
Sections
.text Size: 367KB - Virtual size: 367KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ