Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_7f84e547bc39b76ee22a4ec570cf21c2_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_7f84e547bc39b76ee22a4ec570cf21c2_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_7f84e547bc39b76ee22a4ec570cf21c2_mafia_JC.exe
-
Size
255KB
-
MD5
7f84e547bc39b76ee22a4ec570cf21c2
-
SHA1
3ca3596bc00acfb6a9c66a6432c289b171fcfa88
-
SHA256
418d0170de73b2f5b9637cf1ee1f7407ed9368be8a07a3541b5833b54c22ac19
-
SHA512
9e86702d023bf1daa3b5a3724641ed5546630830a791bb3dbb220078cd93c96288255d5e0a51378f4d1563026e3a59c48d415a515a60487c2b938ab654e6dbf3
-
SSDEEP
6144:o64tXafE0Mqpm+SKAqpByuqPoEbLvRdvfZ:o68r0Mqpm+SCB3KbLzx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-26_7f84e547bc39b76ee22a4ec570cf21c2_mafia_JC.exe
Files
-
2023-08-26_7f84e547bc39b76ee22a4ec570cf21c2_mafia_JC.exe.exe windows:5 windows x86
887228b420011e203406ef98408b3ef0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetCurrentProcess
CreateDirectoryW
WaitForSingleObject
GetModuleHandleW
CopyFileW
GetExitCodeProcess
GetModuleFileNameW
WritePrivateProfileStringW
GetTempPathW
SetLastError
GetProcAddress
MoveFileW
GetModuleFileNameA
DeleteFileW
FindFirstFileW
OpenProcess
TerminateProcess
FindClose
Process32FirstW
RemoveDirectoryW
Sleep
FindNextFileW
CreateToolhelp32Snapshot
CloseHandle
GetProcessHeap
SetEndOfFile
HeapReAlloc
FlushFileBuffers
WriteConsoleW
IsProcessorFeaturePresent
SetStdHandle
CreateFileA
HeapSize
GetStringTypeW
RaiseException
GetCurrentProcessId
GetTickCount
Process32NextW
WideCharToMultiByte
QueryPerformanceCounter
HeapCreate
ExitProcess
DecodePointer
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetLastError
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
HeapAlloc
LCMapStringW
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
WriteFile
GetStdHandle
RtlUnwind
ReadFile
GetConsoleCP
GetConsoleMode
SetFilePointer
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
CreateFileW
user32
MessageBoxW
MessageBoxA
wsprintfW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteExW
ShellExecuteW
SHGetMalloc
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
HttpQueryInfoA
iphlpapi
GetAdaptersInfo
shlwapi
PathFileExistsW
PathFindFileNameW
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ