Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_ffc972fc5923861c10bc1a6947829888_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_ffc972fc5923861c10bc1a6947829888_mafia_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_ffc972fc5923861c10bc1a6947829888_mafia_JC.exe
-
Size
350KB
-
MD5
ffc972fc5923861c10bc1a6947829888
-
SHA1
459da3abe8cee8da3e7f590826a1fff5e5d56577
-
SHA256
e934c71a6bddd93ffc8880e01ba724de21b05866d6c154a21237131d689b3499
-
SHA512
df6598a5052d4e37253975c59a508081f9c4c079132573f5997a50d9cf9547e66308e43b84f55f5b2719cae41c285ef6b149a6ba326a305180895db6fae3442c
-
SSDEEP
6144:YOYAl7pO3bRiocu8GrND7OneieCOsYwRK6uCkIlnNcJOcDePlSLhsP2g8yl4:/YAl7k3bRiocuRrND7OneieNsVKjZIz7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_ffc972fc5923861c10bc1a6947829888_mafia_JC.exe
Files
-
2023-08-22_ffc972fc5923861c10bc1a6947829888_mafia_JC.exe.exe windows x86
2c2aff551c77f0fec5682f1b4867b3f7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveFileSpecW
PathAppendW
winmm
timeGetTime
kernel32
GetSystemDirectoryW
ReadProcessMemory
GetFileAttributesW
TerminateProcess
GetCurrentDirectoryW
VirtualProtectEx
GetExitCodeThread
DuplicateHandle
GetCurrentProcessId
WriteProcessMemory
CreateFileW
LocalAlloc
DeviceIoControl
GetCurrentThreadId
GetVersion
VirtualQuery
IsBadReadPtr
GetProcAddress
CreateFileMappingW
HeapAlloc
HeapFree
GetCurrentThread
GetProcessHeap
CreateRemoteThread
VirtualQueryEx
VirtualFreeEx
VirtualAllocEx
VirtualProtect
CreateFileA
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
HeapSize
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTickCount
GetCurrentProcess
UnmapViewOfFile
MapViewOfFile
Module32NextW
Module32FirstW
AttachConsole
SetLastError
SetHandleCount
FreeConsole
CreateThread
InterlockedExchange
FlushFileBuffers
DisconnectNamedPipe
ReadFile
TerminateThread
WriteFile
CreateNamedPipeW
ConnectNamedPipe
WaitForSingleObject
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
GetModuleFileNameA
Process32FirstW
OpenProcess
GetModuleHandleW
LocalFree
DeleteCriticalSection
EnterCriticalSection
GetLastError
GetModuleFileNameW
LeaveCriticalSection
FormatMessageW
CopyFileW
Sleep
InitializeCriticalSection
GetCommandLineW
SetStdHandle
SetEndOfFile
SetEnvironmentVariableA
GetEnvironmentStringsW
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
RaiseException
WideCharToMultiByte
PeekNamedPipe
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
GetLocaleInfoW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteConsoleW
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapReAlloc
GetCPInfo
RtlUnwind
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringW
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetStdHandle
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetFileType
user32
GetWindowTextW
MessageBoxW
GetWindowThreadProcessId
EnumWindows
advapi32
OpenServiceW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetKernelObjectSecurity
AdjustTokenPrivileges
LookupPrivilegeValueW
GetTokenInformation
OpenProcessToken
RegEnumKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExW
RegCloseKey
QueryServiceConfigW
ControlService
ReportEventW
UnlockServiceDatabase
RegOpenKeyExW
SetServiceStatus
ChangeServiceConfigW
QueryServiceStatus
StartServiceW
LookupAccountNameW
RegDeleteKeyW
DeregisterEventSource
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
RegisterServiceCtrlHandlerExW
GetUserNameW
StartServiceCtrlDispatcherW
OpenSCManagerW
DeleteService
CloseServiceHandle
RegisterEventSourceW
CreateServiceW
shell32
CommandLineToArgvW
SHGetFolderPathW
Sections
.text Size: 274KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ