Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_78dd4713005ebb9c4984ca458e51f4f8_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_78dd4713005ebb9c4984ca458e51f4f8_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_78dd4713005ebb9c4984ca458e51f4f8_mafia_JC.exe
-
Size
703KB
-
MD5
78dd4713005ebb9c4984ca458e51f4f8
-
SHA1
0cf0b21e600683723586accca653491517d7cda1
-
SHA256
ed5b04c2b420397f287a4d19c2f8931ebc34dcd7f2326030cd791f6a6ef06f96
-
SHA512
5ce3dfa5267fba59ebbef65e812e4bb0540de6c7f76c7f563cfdd3746a69ab8e359665b574a9b3efe214c05faa0c57926a5ea88a6c4a00151b3973693d1a2106
-
SSDEEP
12288:xtqy1NzJfQuwfRww01GzQHfyoum8yGweJw1BRjqm117NN4/Zd8vzWN9Yr/rUx1te:xtd1NzJjwfyvya1xNs8vzWNo/rUx1tip
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-27_78dd4713005ebb9c4984ca458e51f4f8_mafia_JC.exe
Files
-
2023-08-27_78dd4713005ebb9c4984ca458e51f4f8_mafia_JC.exe.exe windows:5 windows x86
e06696df5ac3de476b606f8e757fafac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
uxtheme
IsThemeActive
DrawThemeBackground
OpenThemeData
DrawThemeText
shlwapi
PathIsDirectoryW
wnsprintfW
StrToIntW
ord12
gdiplus
GdipCreateBitmapFromStream
GdipFree
GdipDeletePen
GdipAlloc
GdipCreateFromHDC
GdipLoadImageFromStream
GdipCreatePen1
GdipDrawLineI
GdipCloneImage
GdipGetImageBounds
GdipDeleteGraphics
GdipDrawImageRectI
GdipDisposeImage
GdiplusStartup
kernel32
SystemTimeToFileTime
GetCurrentProcess
GetLogicalDriveStringsW
CreateDirectoryW
GlobalLock
GetModuleHandleW
WriteFile
GlobalAlloc
WideCharToMultiByte
Sleep
SizeofResource
GetVersionExW
GetExitCodeProcess
GetFileAttributesW
TerminateProcess
ReadFile
GetModuleFileNameW
CreateFileW
MultiByteToWideChar
GlobalUnlock
GetTempPathW
GetFileSizeEx
GetLongPathNameW
SetLastError
GetProcAddress
GlobalFree
FindClose
Process32FirstW
LocalAlloc
RemoveDirectoryW
CreatePipe
Process32NextW
GetModuleHandleA
FindNextFileW
CreateToolhelp32Snapshot
GetShortPathNameW
GetDiskFreeSpaceExW
DeleteFileW
LocalFree
GetSystemTime
SetFileAttributesW
ExpandEnvironmentStringsW
GetSystemDefaultLangID
GetUserDefaultLangID
FreeResource
GetFileSize
InitializeCriticalSection
FormatMessageW
LeaveCriticalSection
FindResourceExW
DeleteCriticalSection
CreateProcessW
CreateThread
GlobalMemoryStatusEx
GetCurrentProcessId
VerSetConditionMask
VerifyVersionInfoW
GetWindowsDirectoryW
GetExitCodeThread
GetVolumeInformationW
LockResource
InterlockedCompareExchange
SetEnvironmentVariableA
GetProcessHeap
SetEndOfFile
SetEnvironmentVariableW
CompareStringW
GetTimeZoneInformation
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
WriteConsoleW
SetStdHandle
LoadLibraryW
InterlockedExchange
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
GetStringTypeW
GetConsoleMode
GetConsoleCP
HeapSize
RtlUnwind
GetTickCount
QueryPerformanceCounter
HeapDestroy
HeapCreate
GetDriveTypeW
SetFilePointer
FindFirstFileW
GetTempFileNameW
CloseHandle
GetLastError
WaitForSingleObject
LoadResource
FindResourceW
TerminateThread
CreateMutexW
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
HeapFree
lstrlenA
GetStartupInfoW
FindFirstFileExW
HeapSetInformation
GetCommandLineW
EncodePointer
EnterCriticalSection
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
GetStdHandle
IsProcessorFeaturePresent
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
DecodePointer
user32
GetDesktopWindow
MessageBoxW
DrawTextW
SendMessageW
ShowWindow
GetSystemMetrics
DefWindowProcW
CallWindowProcW
CreateWindowExW
SetWindowPos
SetWindowLongW
GetWindowLongW
LoadIconW
RegisterClassExW
LoadAcceleratorsW
TranslateMessage
GetClientRect
LoadCursorW
PostQuitMessage
GetMessageW
BeginPaint
EndPaint
UpdateWindow
InvalidateRect
GetWindowTextW
EnableWindow
SetWindowTextW
DispatchMessageW
wsprintfW
PostMessageW
GetWindowRect
GetClassInfoW
GetDC
ReleaseDC
DrawStateW
DrawFrameControl
DestroyWindow
TranslateAcceleratorW
gdi32
SetTextAlign
SetTextColor
SetBkMode
GetTextColor
GetTextExtentPoint32W
CreateFontW
DeleteDC
SelectObject
CreateCompatibleDC
TextOutW
advapi32
GetUserNameA
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegOpenKeyW
RegQueryValueExW
EqualSid
RegCreateKeyExW
GetTokenInformation
OpenProcessToken
shell32
SHCreateDirectoryExW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
ord165
CommandLineToArgvW
SHChangeNotify
SHFileOperationW
ole32
OleRun
CLSIDFromProgID
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CoCreateGuid
StringFromGUID2
CoCreateInstance
CoInitialize
CoUninitialize
wininet
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetQueryOptionW
InternetCrackUrlW
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
HttpAddRequestHeadersW
InternetSetOptionW
oleaut32
SysAllocString
VariantClear
SysFreeString
GetErrorInfo
Sections
.text Size: 460KB - Virtual size: 460KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ