Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_4ec3bf2ea939949a005d586dca2e9c35_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_4ec3bf2ea939949a005d586dca2e9c35_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_4ec3bf2ea939949a005d586dca2e9c35_mafia_JC.exe
-
Size
579KB
-
MD5
4ec3bf2ea939949a005d586dca2e9c35
-
SHA1
6090cc47e87b1d14da30833efb6539fb89ee53c5
-
SHA256
0d2f0e354c2d5ff9e8d1cf1ea987d270fab84d44d1fca75ef0296e559221927e
-
SHA512
72ebc5293b4d1b0df6ab11a4e130da4a3cd07405d9122afcf38971b2a44b41f1ac95cc2c6351af1d91f32d541875b284db3e2e4b92ce6a53eaf0c54708e092b9
-
SSDEEP
12288:k250Lcnj7tTzTnJUojMDiniwD2R4m87JGmC8HwXN2AM+Tl7F+giZci97q52:u+7Vzv7MmC8arTlB+gAci9w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-26_4ec3bf2ea939949a005d586dca2e9c35_mafia_JC.exe
Files
-
2023-08-26_4ec3bf2ea939949a005d586dca2e9c35_mafia_JC.exe.exe windows:5 windows x86
7e357bc90dcb48d790ae4f75ad1546bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
TlsSetValue
TerminateThread
LeaveCriticalSection
EnterCriticalSection
ResetEvent
SetEvent
TlsAlloc
CreateThread
GetComputerNameA
GetCurrentProcess
SetConsoleCtrlHandler
GetModuleFileNameA
WaitForSingleObject
TlsGetValue
TryEnterCriticalSection
CloseHandle
CreateMailslotA
CancelIo
WaitForMultipleObjects
LoadLibraryA
GetProcAddress
GetLastError
GetOverlappedResult
ReadFile
CreateEventA
WriteFile
FormatMessageA
CreateFileA
QueryPerformanceFrequency
MultiByteToWideChar
Sleep
GetTickCount
DeleteCriticalSection
QueryPerformanceCounter
GetProcessHeap
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
HeapSize
HeapReAlloc
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetStringTypeW
LCMapStringW
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCurrentDirectoryW
LoadLibraryW
CreateFileW
SetFilePointer
GetTimeZoneInformation
IsProcessorFeaturePresent
GetConsoleMode
GetConsoleCP
GetStartupInfoW
GetFileType
SetHandleCount
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetStdHandle
HeapCreate
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
WideCharToMultiByte
GetTimeFormatA
GetDateFormatA
GetModuleHandleW
ExitProcess
DecodePointer
GetDriveTypeW
GetFullPathNameA
GetCommandLineA
HeapSetInformation
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsFree
SetLastError
GetCurrentThreadId
advapi32
ControlService
OpenSCManagerA
SetServiceStatus
RegOpenKeyExA
ReportEventA
RegisterServiceCtrlHandlerExA
StartServiceA
DeregisterEventSource
CreateServiceA
RegQueryValueExA
ChangeServiceConfig2A
DeleteService
StartServiceCtrlDispatcherA
RegisterEventSourceA
CloseServiceHandle
OpenServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
InitiateSystemShutdownA
RegCloseKey
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
ws2_32
WSAIoctl
connect
WSAStartup
inet_addr
select
WSAGetLastError
htons
getsockname
setsockopt
ioctlsocket
WSACleanup
recv
bind
socket
freeaddrinfo
__WSAFDIsSet
closesocket
send
WSASocketA
gethostname
ntohs
htonl
recvfrom
getpeername
listen
accept
ntohl
sendto
getaddrinfo
Sections
.text Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 157KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ