Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_5b6b727b19e1a6d3c383619654a75df4_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_5b6b727b19e1a6d3c383619654a75df4_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_5b6b727b19e1a6d3c383619654a75df4_mafia_JC.exe
-
Size
255KB
-
MD5
5b6b727b19e1a6d3c383619654a75df4
-
SHA1
bfe935b4e18e0f33a792cc249e3eca30c25d459a
-
SHA256
fbb5324da6c2be2d09684e82dd87e0ec0d5c46669b100c840c44f7b5939c8619
-
SHA512
fbc157a470e7ff8a1cca06aee60410165cc2c97d1ea1e21e588aaf557cfb5570734094d4eac607acca8b0268df1ac51fe43172dd4e1df9911f9a5c8078d08945
-
SSDEEP
6144:o64tXafE0Mqpm+SKAqpByuqPoEbLvRdvfG:o68r0Mqpm+SCB3KbLzu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-26_5b6b727b19e1a6d3c383619654a75df4_mafia_JC.exe
Files
-
2023-08-26_5b6b727b19e1a6d3c383619654a75df4_mafia_JC.exe.exe windows:5 windows x86
887228b420011e203406ef98408b3ef0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetCurrentProcess
CreateDirectoryW
WaitForSingleObject
GetModuleHandleW
CopyFileW
GetExitCodeProcess
GetModuleFileNameW
WritePrivateProfileStringW
GetTempPathW
SetLastError
GetProcAddress
MoveFileW
GetModuleFileNameA
DeleteFileW
FindFirstFileW
OpenProcess
TerminateProcess
FindClose
Process32FirstW
RemoveDirectoryW
Sleep
FindNextFileW
CreateToolhelp32Snapshot
CloseHandle
GetProcessHeap
SetEndOfFile
HeapReAlloc
FlushFileBuffers
WriteConsoleW
IsProcessorFeaturePresent
SetStdHandle
CreateFileA
HeapSize
GetStringTypeW
RaiseException
GetCurrentProcessId
GetTickCount
Process32NextW
WideCharToMultiByte
QueryPerformanceCounter
HeapCreate
ExitProcess
DecodePointer
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetLastError
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
HeapAlloc
LCMapStringW
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
WriteFile
GetStdHandle
RtlUnwind
ReadFile
GetConsoleCP
GetConsoleMode
SetFilePointer
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
CreateFileW
user32
MessageBoxW
MessageBoxA
wsprintfW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteExW
ShellExecuteW
SHGetMalloc
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
HttpQueryInfoA
iphlpapi
GetAdaptersInfo
shlwapi
PathFileExistsW
PathFindFileNameW
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ