Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_f1984dde1281ad39d656c9b4ec4c1b1f_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_f1984dde1281ad39d656c9b4ec4c1b1f_mafia_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_f1984dde1281ad39d656c9b4ec4c1b1f_mafia_JC.exe
-
Size
1.7MB
-
MD5
f1984dde1281ad39d656c9b4ec4c1b1f
-
SHA1
42f1e48e667ee53a055bd55b7eb0bcd8836c5d43
-
SHA256
98f8529000f33b2a08e60a4921cf2d72b35b43714fbd73629de4bfc8b47a1d3c
-
SHA512
ad1f365bfb1470d65c2cac62da578f10631c853d5732fab704085dddbd04829a70f1848acea971d8000551c1990245fb6f546a8276c8edacd4f13195aa2fa22a
-
SSDEEP
49152:C5Zp6SIguuBR5+s5SvDwpPtwHvehhFUT8oBa6BeqyZSERu9W:C5qSfuuKv0pPWehhFmBVBeq0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_f1984dde1281ad39d656c9b4ec4c1b1f_mafia_JC.exe
Files
-
2023-08-22_f1984dde1281ad39d656c9b4ec4c1b1f_mafia_JC.exe.exe windows x86
c5941ec274b8976f4909a6f92cc41435
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAWaitForMultipleEvents
send
WSAStartup
WSACleanup
gethostbyname
accept
listen
WSACloseEvent
getsockname
setsockopt
__WSAFDIsSet
closesocket
WSACreateEvent
socket
bind
recv
sendto
WSAEventSelect
htons
WSAEnumNetworkEvents
WSAGetLastError
htonl
inet_addr
connect
ioctlsocket
WSAResetEvent
select
kernel32
GetModuleHandleA
EnterCriticalSection
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
CreatePipe
ReadFile
GetProcessTimes
GetSystemTimeAsFileTime
SetHandleInformation
GetCurrentProcess
GetExitCodeProcess
CreateProcessW
OpenEventW
GetStdHandle
Sleep
WriteFile
WaitForSingleObject
GetCommandLineW
GetUserDefaultUILanguage
GlobalMemoryStatusEx
GetVersionExW
GetNativeSystemInfo
GetProcAddress
GetProcessHeap
HeapFree
HeapAlloc
LocalFree
CloseHandle
SetLastError
GetLastError
CreateFileW
GetSystemDirectoryW
GetModuleHandleW
FreeLibrary
InterlockedCompareExchange
SetEnvironmentVariableA
GetDriveTypeW
SetStdHandle
WriteConsoleW
CompareStringW
InterlockedExchange
HeapReAlloc
GetTimeZoneInformation
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileA
GetFullPathNameA
SetFilePointer
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
GetModuleFileNameA
RtlUnwind
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
ExitProcess
HeapSize
HeapCreate
IsProcessorFeaturePresent
RaiseException
GetLocaleInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
MapViewOfFile
UnmapViewOfFile
VirtualQuery
ProcessIdToSessionId
CreateFileMappingW
OpenFileMappingW
GetCurrentProcessId
LoadLibraryW
IsWow64Process
WideCharToMultiByte
MultiByteToWideChar
SetEvent
ReleaseSemaphore
ResetEvent
CreateSemaphoreW
CreateEventW
DeleteCriticalSection
GetTickCount
lstrlenA
QueryPerformanceCounter
QueryPerformanceFrequency
lstrlenW
CreateMutexW
PeekNamedPipe
SystemTimeToFileTime
FormatMessageW
FileTimeToSystemTime
SetThreadPriority
FlushFileBuffers
OpenMutexW
WaitForMultipleObjects
ReleaseMutex
FileTimeToLocalFileTime
ResumeThread
SetEnvironmentVariableW
GetModuleHandleExW
CreateDirectoryW
GetCurrentThread
CopyFileW
GetFileAttributesW
GetModuleFileNameW
FindClose
GetFileAttributesExW
GetWindowsDirectoryW
DeleteFileW
SetEndOfFile
SetFilePointerEx
GetFileInformationByHandle
GetCurrentThreadId
GetCurrentDirectoryW
GetProcessAffinityMask
SetThreadAffinityMask
InterlockedDecrement
GetSystemDirectoryA
lstrcmpiW
GetSystemDefaultLangID
DeviceIoControl
DecodePointer
EncodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
ExitThread
CreateThread
MoveFileW
GetDriveTypeA
FindFirstFileExA
user32
EnumDisplayDevicesW
EnumDisplaySettingsW
GetSystemMetrics
EnumDisplaySettingsExW
advapi32
CryptGetHashParam
CryptAcquireContextW
CryptReleaseContext
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
CryptHashData
CryptDestroyHash
CryptCreateHash
RegSetValueExW
RegCreateKeyExW
SetEntriesInAclW
SetSecurityDescriptorDacl
ConvertStringSidToSidW
InitializeSecurityDescriptor
RegQueryValueExW
shell32
SHGetFolderPathW
CommandLineToArgvW
shlwapi
PathCombineW
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiSetDeviceInstallParamsW
SetupDiDestroyDriverInfoList
SetupDiEnumDriverInfoW
SetupDiGetDeviceInstallParamsW
SetupDiBuildDriverInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiGetDriverInstallParamsW
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
winhttp
WinHttpAddRequestHeaders
WinHttpReadData
WinHttpCrackUrl
WinHttpOpen
WinHttpOpenRequest
WinHttpSetOption
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpQueryDataAvailable
ole32
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoCreateGuid
StringFromGUID2
CoInitialize
oleaut32
SafeArrayGetElement
VariantChangeType
VariantCopy
VariantClear
SysStringLen
SysFreeString
VariantInit
SafeArrayGetLBound
SysAllocString
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ