Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_25f5ce203b775330d571fde30a5fc1e9_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_25f5ce203b775330d571fde30a5fc1e9_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_25f5ce203b775330d571fde30a5fc1e9_mafia_JC.exe
-
Size
16.5MB
-
MD5
25f5ce203b775330d571fde30a5fc1e9
-
SHA1
75d648364a532633fcf158dc6f68dbf8e0aa9883
-
SHA256
7feb16c4b28447f4237983f844cce231cec1288ecb8fd36781114977d0dd29bd
-
SHA512
63862460bee9b66600a7d4c5e1fab2ffcadbc8d33ac5b601a966454fec1e1f1de92726c76e3f1bf10c63bdf76eb2120a7de2064b66224ef0679b611860b007e3
-
SSDEEP
196608:H5N97cedoQaSWgmoVZPm6BqCOte0jlob/dpskuouzyhPSBkhj04OUSwuBjDwgg5Q:92SblqCpskuouDBkluBjCUoQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-26_25f5ce203b775330d571fde30a5fc1e9_mafia_JC.exe
Files
-
2023-08-26_25f5ce203b775330d571fde30a5fc1e9_mafia_JC.exe.exe windows x86
b42cdefe0002826684547d8ee81a1c63
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipAlloc
GdipDisposeImage
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetPageUnit
GdipSetPageScale
GdipGetDpiX
GdipDrawImageRectI
GdipLoadImageFromFile
GdipCloneImage
GdipGetImageWidth
GdipGetImageHeight
GdiplusStartup
GdipDeleteBrush
GdipCloneBrush
GdipCreateLineBrush
GdipFillRectangle
GdipSetLineBlend
GdipFillRectangleI
GdipCreateLineBrushI
GdipFree
GdipDrawImageI
GdipGetImageGraphicsContext
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipSetInterpolationMode
GdipCreateBitmapFromHBITMAP
GdipLoadImageFromFileICM
GdiplusShutdown
winmm
PlaySoundA
timeGetTime
wininet
InternetSetOptionA
HttpQueryInfoA
InternetOpenUrlA
InternetReadFile
InternetAttemptConnect
InternetOpenA
InternetQueryOptionA
InternetCloseHandle
kernel32
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetACP
GetCPInfo
GetOEMCP
GetSystemDirectoryW
SetErrorMode
FindResourceExW
GetWindowsDirectoryA
GetNumberFormatA
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetTimeFormatA
GetDriveTypeA
FindFirstFileExA
HeapReAlloc
RemoveDirectoryA
PeekNamedPipe
VirtualAlloc
VirtualQuery
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
SetStdHandle
HeapQueryInformation
HeapSize
UnhandledExceptionFilter
IsDebuggerPresent
IsValidCodePage
GetStdHandle
LCMapStringW
IsProcessorFeaturePresent
SetHandleCount
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetCurrentDirectoryW
GetLocaleInfoW
CompareStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeW
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
GetProcessHeap
CreateFileW
SetEnvironmentVariableA
GlobalFlags
GetPrivateProfileStringA
WritePrivateProfileStringA
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
GetPrivateProfileSectionNamesA
LoadLibraryExW
LocalSize
FindResourceW
LoadResource
WideCharToMultiByte
SizeofResource
LockResource
InterlockedIncrement
InterlockedCompareExchange
LeaveCriticalSection
SetThreadPriority
EnterCriticalSection
DeleteCriticalSection
SetThreadAffinityMask
CreateThread
GetCurrentThread
OutputDebugStringA
GetTempPathA
SuspendThread
ResumeThread
SetLastError
GetPrivateProfileIntA
GetUserDefaultUILanguage
ConvertDefaultLocale
DeactivateActCtx
GetLastError
LoadLibraryA
GetModuleHandleA
GetProcAddress
ActivateActCtx
GetSystemInfo
GetThreadTimes
QueryThreadCycleTime
_llseek
_lread
_hread
_lopen
_lclose
MultiByteToWideChar
DeleteFileA
CopyFileA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FindResourceA
FreeResource
InterlockedDecrement
GetTickCount
GetUserDefaultLangID
ExitProcess
WaitForSingleObject
CreateDirectoryA
FindFirstFileA
FindNextFileA
SetThreadLocale
GetCurrentProcess
InitializeCriticalSection
VirtualFreeEx
VirtualAllocEx
lstrlenA
lstrcpyA
lstrcatA
lstrcpynA
ExitThread
HeapAlloc
HeapFree
HeapDestroy
HeapCreate
GetCurrentThreadId
GetSystemDirectoryA
GetVolumeInformationA
GetSystemDefaultLCID
SetUnhandledExceptionFilter
GetModuleFileNameA
CreateFileA
GetCurrentProcessId
CloseHandle
TerminateProcess
Sleep
TerminateThread
GetFileSize
ReadFile
GetSystemDefaultLangID
FreeLibrary
QueryPerformanceCounter
GetExitCodeThread
MulDiv
WriteFile
CompareStringA
WinExec
GetDateFormatA
FindClose
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateProcessA
GetSystemTime
GetTimeZoneInformation
GetVersionExA
SystemTimeToFileTime
OpenProcess
DuplicateHandle
GetFileType
SetFilePointer
GetCurrentDirectoryA
DosDateTimeToFileTime
SetFileTime
FileTimeToSystemTime
GetFileInformationByHandle
FileTimeToDosDateTime
UnmapViewOfFile
GetLocalTime
GetVersion
lstrlenW
LocalFree
FormatMessageA
lstrcmpW
LoadLibraryW
GlobalDeleteAtom
GlobalFindAtomA
LocalAlloc
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
GetStringTypeExA
GetThreadLocale
lstrcmpiA
MoveFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFullPathNameA
GetShortPathNameA
GetFileAttributesExA
SetFileAttributesA
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
CreateEventA
CreateActCtxW
ReleaseActCtx
GetModuleFileNameW
VirtualProtect
GetUserDefaultLCID
ReplaceFileA
GetTempFileNameA
GetDiskFreeSpaceA
GetProfileIntA
InterlockedExchange
GetModuleHandleW
LoadLibraryExA
GetLocaleInfoA
GetSystemDefaultUILanguage
SearchPathA
user32
SetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
CheckDlgButton
SendDlgItemMessageA
WinHelpA
IsChild
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MonitorFromWindow
GetMonitorInfoA
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
ShowScrollBar
ValidateRect
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
DeferWindowPos
SetScrollInfo
SetWindowPlacement
GetWindowPlacement
GetDlgCtrlID
CallWindowProcA
SetWindowPos
GetMenuStringA
InsertMenuA
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
IntersectRect
GetWindowDC
SetWindowRgn
GrayStringA
DrawTextExA
TabbedTextOutA
IsRectEmpty
EqualRect
LockWindowUpdate
MapWindowPoints
TrackPopupMenuEx
SetCapture
ReleaseCapture
CreateIconIndirect
CheckMenuRadioItem
LoadCursorW
SetForegroundWindow
GetLastActivePopup
MessageBoxW
GetWindowRgn
GetClassNameA
SetWindowsHookExA
CallNextHookEx
MapDialogRect
UnhookWindowsHookEx
GetCursorPos
SetCursorPos
GetWindow
GetWindowThreadProcessId
MessageBoxA
SendInput
SetRectEmpty
IsClipboardFormatAvailable
GetAsyncKeyState
InvertRect
SendMessageW
DispatchMessageA
IsDialogMessageA
PeekMessageA
FrameRect
EnableMenuItem
RemoveMenu
UpdateLayeredWindow
CreatePopupMenu
MoveWindow
GetCapture
GetDlgItemTextW
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetDesktopWindow
AppendMenuA
GetMenu
DeleteMenu
GetMenuItemInfoA
ReuseDDElParam
UnpackDDElParam
GetMenuItemID
LoadMenuW
GetSubMenu
GetMenuItemCount
IsWindowVisible
DestroyAcceleratorTable
PostQuitMessage
SetDlgItemTextW
CloseClipboard
GetClipboardData
OpenClipboard
GetFocus
RegisterClassA
LoadCursorA
CreateWindowExA
ScreenToClient
GetDlgItem
DefWindowProcA
SetCursor
EndPaint
BeginPaint
GetWindowTextA
SetWindowLongA
GetWindowLongA
LoadIconA
LoadIconW
GetScrollPos
GetIconInfo
LoadImageA
DestroyIcon
KillTimer
SetTimer
IsWindow
ReleaseDC
GetDC
MonitorFromPoint
CreateAcceleratorTableA
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
GetSystemMetrics
DrawFocusRect
OffsetRect
ShowWindow
PostMessageA
PtInRect
GetParent
GetWindowRect
DrawTextA
DrawIcon
FillRect
InflateRect
RedrawWindow
GetClientRect
CopyRect
SetRect
DrawFrameControl
DrawEdge
SetWindowTextA
CharUpperA
GetKeyNameTextA
MapVirtualKeyA
GetMessageA
DefFrameProcA
DefMDIChildProcA
BringWindowToTop
SubtractRect
GetDoubleClickTime
CharUpperBuffA
CopyIcon
GetUpdateRect
DrawStateA
DrawIconEx
NotifyWinEvent
EnableScrollBar
HideCaret
GetMenuDefaultItem
CreateMenu
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
CharNextA
SetMenuDefaultItem
MapVirtualKeyExA
IsCharLowerA
LoadImageW
EmptyClipboard
SetClipboardData
TranslateMessage
PostThreadMessageA
GetTabbedTextExtentA
MessageBeep
UnionRect
IsZoomed
UnregisterClassA
SetLayeredWindowAttributes
EnumDisplayMonitors
CopyImage
GetDialogBaseUnits
GetSysColorBrush
WaitMessage
GetTabbedTextExtentW
RealChildWindowFromPoint
TranslateMDISysAccel
ShowOwnedPopups
LoadAcceleratorsW
SetWindowContextHelpId
RegisterClipboardFormatA
GetDCEx
SetParent
GetSystemMenu
SystemParametersInfoA
WindowFromPoint
AdjustWindowRect
RegisterClassW
DefMDIChildProcW
DefDlgProcW
DefDlgProcA
DefFrameProcW
DefWindowProcW
CallWindowProcW
LoadStringA
GetMenuStringW
LoadBitmapA
LookupIconIdFromDirectoryEx
EnumWindows
IsWindowUnicode
GetWindowLongW
SetWindowLongW
mouse_event
SendMessageTimeoutA
GetCursor
ShowCaret
GetKeyboardLayoutList
wsprintfA
CreateIconFromResourceEx
GetSysColor
DrawMenuBar
ClientToScreen
LoadBitmapW
GetKeyState
SendMessageA
RegisterWindowMessageA
LoadMenuA
DestroyMenu
LoadAcceleratorsA
InsertMenuItemA
DestroyCursor
IsIconic
CheckMenuItem
InvalidateRect
UpdateWindow
EnableWindow
TranslateAcceleratorA
IsMenu
GetScrollInfo
SetClassLongA
gdi32
BeginPath
CloseFigure
EndPath
StrokeAndFillPath
FillPath
StrokePath
ExtTextOutW
SetBrushOrgEx
GetBitmapBits
SetWinMetaFileBits
GetObjectA
ScaleViewportExtEx
SetPixelV
SetPaletteEntries
ExtFloodFill
RoundRect
SetPixel
GetDIBits
SetDIBColorTable
Polyline
GetSystemPaletteEntries
GetNearestPaletteIndex
GetPaletteEntries
EnumFontFamiliesExA
GetTextCharsetInfo
EnumFontFamiliesA
CreateDIBitmap
CreateEllipticRgn
GetWindowOrgEx
GetTextExtentPoint32W
GetTextExtentPointA
GetCharWidthA
GetTextFaceA
GetStretchBltMode
GetROP2
GetPolyFillMode
SetRectRgn
CreateRectRgnIndirect
CopyMetaFileA
CreateHatchBrush
CreatePen
GetObjectType
CreatePatternBrush
ExtSelectClipRgn
PolyBezierTo
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
CreateSolidBrush
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetClipRgn
SelectClipRgn
SetLayout
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetROP2
SetPolyFillMode
RestoreDC
SaveDC
SetMapMode
CreateDIBSection
CreatePolyPolygonRgn
GetPixel
GetRgnBox
CombineRgn
CreatePolygonRgn
CreateRoundRectRgn
FrameRgn
FillRgn
GetRegionData
ExtCreateRegion
Escape
PtVisible
RectVisible
GetViewportExtEx
GetWindowExtEx
LPtoDP
DeleteDC
GetBkColor
GetNearestColor
AbortDoc
EndDoc
EndPage
StartPage
DPtoLP
StartDocA
SetAbortProc
CreateDCA
GetViewportOrgEx
GetCurrentPositionEx
ResetDCA
CreateBitmap
PtInRegion
OffsetRgn
RealizePalette
GetTextAlign
Arc
PatBlt
UnrealizeObject
SetBkColor
GetDeviceCaps
GetCurrentObject
GetTextColor
CreateRectRgn
SetTextAlign
TextOutA
ExtTextOutA
Rectangle
GetStockObject
CreateFontIndirectA
GetBoundsRect
StretchBlt
StretchDIBits
SetStretchBltMode
SelectPalette
CreatePalette
GetTextMetricsA
SelectObject
GetBkMode
SetTextColor
SetBkMode
DeleteObject
Ellipse
Polygon
GetTextExtentPoint32A
CreateFontA
GetMapMode
GetLayout
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
PlayEnhMetaFile
msimg32
TransparentBlt
AlphaBlend
comdlg32
GetFileTitleA
winspool.drv
GetJobA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
SetFileSecurityA
GetFileSecurityA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegSetValueA
RegOpenKeyExW
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegEnumKeyA
RegQueryValueA
shell32
ExtractIconExA
FindExecutableA
DragAcceptFiles
SHGetFolderPathA
Shell_NotifyIconA
SHGetFileInfoA
DragFinish
SHBrowseForFolderA
SHGetMalloc
SHAppBarMessage
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetDesktopFolder
SHAddToRecentDocs
ExtractIconA
DragQueryFileA
ShellExecuteA
comctl32
ImageList_GetImageInfo
ImageList_AddMasked
ImageList_Destroy
ImageList_GetImageCount
ImageList_Create
ImageList_GetBkColor
ImageList_GetIconSize
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_DrawEx
FlatSB_GetScrollProp
ImageList_Draw
_TrackMouseEvent
ImageList_DrawIndirect
shlwapi
PathRemoveFileSpecW
PathFindExtensionA
PathRemoveExtensionA
PathFindFileNameA
PathIsUNCA
PathStripToRootA
ole32
RevokeDragDrop
RegisterDragDrop
CoInitialize
DoDragDrop
StgCreateDocfileOnILockBytes
OleGetClipboard
CoLockObjectExternal
OleLockRunning
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoGetClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoCreateGuid
CLSIDFromString
CLSIDFromProgID
OleRun
CoInitializeEx
CoCreateInstance
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
StringFromCLSID
CoTaskMemFree
CoDisconnectObject
GetHGlobalFromStream
CoUninitialize
oleaut32
SystemTimeToVariantTime
SysFreeString
VarBstrFromDate
VarUdateFromDate
VariantClear
SysAllocString
VariantInit
OleCreateFontIndirect
LoadTypeLi
SafeArrayDestroy
OleLoadPicturePath
VarCmp
VariantChangeTypeEx
VariantCopy
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SysStringByteLen
SafeArrayUnaccessData
SysStringLen
SysAllocStringLen
VariantChangeType
OleCreatePictureIndirect
VarDateFromStr
SysAllocStringByteLen
VariantTimeToSystemTime
oledlg
ord8
ord1
usp10
ScriptLayout
ScriptItemize
ScriptFreeCache
ScriptShape
ScriptPlace
ScriptCPtoX
oleacc
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
imm32
ImmGetOpenStatus
ImmReleaseContext
ImmGetContext
imagehlp
ImageDirectoryEntryToData
Sections
.text Size: 6.3MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 876KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7.1MB - Virtual size: 7.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 661KB - Virtual size: 660KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ