Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_ba6bf82228aa9399adf12ee14758b125_mafia_JC.exe
Resource
win7-20230831-en
General
-
Target
2023-08-25_ba6bf82228aa9399adf12ee14758b125_mafia_JC.exe
-
Size
3.4MB
-
MD5
ba6bf82228aa9399adf12ee14758b125
-
SHA1
ebf57791f61d7acafc4521369936b865c1e240f8
-
SHA256
9e1e5a5d4dc94490cd0d178a040a764942540ba93d5e9ef9fd9c2ebf74fade2f
-
SHA512
98e061e1a886a6eee3803f78af5bc3f4c59bff6e1ae91e43f4cea4d6d81677fd5e6cb26dce86db6f5bffb9f1a0601d6afb35472c328b70b98c5f5fd75cba97e7
-
SSDEEP
49152:PT2ay7n0lfQehT+d2xJqyUvj4HNC6alAYG6Tlw15VOrtoSKtopqTGlfRqrWmDUSm:CaY0lfQehT+4eONCDAD6Tlw1g+SKtdX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-25_ba6bf82228aa9399adf12ee14758b125_mafia_JC.exe
Files
-
2023-08-25_ba6bf82228aa9399adf12ee14758b125_mafia_JC.exe.exe windows:5 windows x86
5ba3d907cb65a088624aa3441fbfbd06
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
GlobalLock
GlobalAlloc
InitializeCriticalSectionAndSpinCount
GlobalUnlock
WriteProcessMemory
IsDBCSLeadByte
lstrcmpiA
LoadLibraryExA
WinExec
lstrcatA
CreateProcessA
GetPrivateProfileIntA
Process32First
lstrlenA
lstrcmpA
FindResourceA
ReleaseMutex
CreateMutexA
FlushConsoleInputBuffer
GlobalMemoryStatus
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
ReadFile
FormatMessageA
VerSetConditionMask
VerifyVersionInfoA
SleepEx
GetModuleHandleA
LoadLibraryA
GetVersionExA
FreeLibrary
LoadLibraryW
MulDiv
GetTickCount
IsBadReadPtr
VirtualFree
InterlockedPushEntrySList
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetEndOfFile
GetDriveTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileW
SetStdHandle
GetStringTypeW
GetEnvironmentStringsW
FreeEnvironmentStringsW
lstrcpyA
CreateFileA
GetFullPathNameA
FlushFileBuffers
FatalAppExitA
SetHandleCount
GetConsoleCP
HeapSize
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
WriteFile
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetDateFormatA
GetTimeFormatA
GetNumberOfConsoleInputEvents
PeekConsoleInputA
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
SetConsoleCtrlHandler
WriteConsoleW
GetTimeZoneInformation
SetFileAttributesA
SetFilePointer
GetFileInformationByHandle
ExitThread
HeapReAlloc
RtlUnwind
GetStartupInfoW
HeapSetInformation
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemTimeAsFileTime
GetFileAttributesA
ExitProcess
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
GetFileAttributesW
HeapCreate
HeapAlloc
LocalFree
LocalAlloc
GetCurrentDirectoryW
Process32Next
HeapFree
HeapDestroy
FlushInstructionCache
GetFullPathNameW
FreeResource
SetLastError
FindResourceW
SizeofResource
LoadResource
LockResource
SetCurrentDirectoryW
CreateMutexW
GetCommandLineW
GetModuleFileNameW
CreateThread
lstrlenW
TerminateThread
WaitForSingleObject
GetTempFileNameA
GetCurrentProcessId
FindNextFileW
GetCurrentProcess
FindNextFileA
GetLocalTime
FindClose
RemoveDirectoryA
FindFirstFileA
GetTempPathW
FindFirstFileW
GetLastError
Sleep
GetTempPathA
MoveFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
DeleteFileA
OutputDebugStringA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
GetModuleFileNameA
Process32FirstW
VirtualAllocEx
GetProcAddress
MultiByteToWideChar
TerminateProcess
GetVersionExW
ReadProcessMemory
VirtualFreeEx
WideCharToMultiByte
OpenProcess
GetModuleHandleW
InterlockedPopEntrySList
user32
GetProcessWindowStation
MessageBoxA
GetShellWindow
LoadImageA
SetWindowTextA
PostMessageA
GetWindowTextA
WindowFromPoint
GetWindowLongA
SetWindowLongA
GetClassInfoExA
GetWindowThreadProcessId
DispatchMessageA
SendMessageW
FindWindowExA
GetWindowRect
IsWindowVisible
CallWindowProcA
SetForegroundWindow
RegisterWindowMessageW
DestroyIcon
GetCursorPos
KillTimer
PostMessageW
SetTimer
wsprintfW
RegisterClassExA
RegisterClassA
AppendMenuA
MoveWindow
RedrawWindow
CreateAcceleratorTableA
RegisterWindowMessageA
SendMessageA
GetWindowTextLengthA
CharNextA
InvalidateRgn
AttachThreadInput
GetMessageA
FindWindowA
LoadCursorA
DestroyWindow
GetActiveWindow
GetDesktopWindow
IsWindowEnabled
EnableWindow
SetActiveWindow
GetWindowLongW
SetWindowPos
GetMessageW
IsChild
FillRect
DefWindowProcA
ShowWindow
TranslateMessage
DispatchMessageW
GetUserObjectInformationW
UpdateLayeredWindow
MapVirtualKeyA
CharLowerBuffW
IsWindow
SystemParametersInfoW
OffsetRect
LoadBitmapW
LoadImageW
UnregisterClassA
InvertRect
DrawIconEx
LoadCursorW
CreateIconFromResource
CopyRect
IsRectEmpty
PtInRect
InflateRect
GetIconInfo
CharNextW
SetCursor
SetRect
EqualRect
IntersectRect
UnionRect
GetParent
GetDlgItem
DefWindowProcW
CallWindowProcW
SetWindowLongW
UnregisterClassW
MapWindowPoints
GetClientRect
GetMonitorInfoW
MonitorFromWindow
GetWindow
CreateWindowExW
RegisterClassExW
DestroyCursor
GetMenuItemInfoW
GetMenuItemCount
CheckMenuItem
GetMenuInfo
SetMenuInfo
GetSysColor
LoadIconW
MessageBoxW
DrawTextW
DestroyAcceleratorTable
GetClassNameA
CreateWindowExA
TrackPopupMenu
DestroyMenu
IsMenu
DeleteMenu
InsertMenuW
SetMenuContextHelpId
CreatePopupMenu
AppendMenuW
ClientToScreen
PostQuitMessage
MsgWaitForMultipleObjects
PeekMessageW
GetForegroundWindow
ScreenToClient
UpdateWindow
InvalidateRect
GetDC
ReleaseDC
SetCapture
SetFocus
SetWindowTextW
IsIconic
ReleaseCapture
GetCapture
HideCaret
CreateCaret
GetCaretBlinkTime
SetCaretPos
IsZoomed
AnimateWindow
TrackMouseEvent
GetClassNameW
EndPaint
BeginPaint
SetLayeredWindowAttributes
GetFocus
GetKeyState
EnableMenuItem
GetSystemMetrics
GetWindowPlacement
SystemParametersInfoA
gdi32
CreateRoundRectRgn
DeleteDC
SelectObject
CreateCompatibleDC
CreateBitmap
SetGraphicsMode
GetDeviceCaps
GetDCOrgEx
GetClipBox
CreateFontIndirectW
BitBlt
GetStockObject
SetBkMode
Rectangle
CreateSolidBrush
EnumFontsW
StretchBlt
SetViewportOrgEx
CreateCompatibleBitmap
GetBitmapBits
GetObjectA
CreateDCA
DeleteObject
GetObjectW
CreateDIBSection
CombineRgn
PtInRegion
RectInRegion
GetRgnBox
OffsetRgn
SetRectRgn
CreateEllipticRgnIndirect
SetTextColor
GetTextColor
ExtSelectClipRgn
SaveDC
CreateRectRgnIndirect
RestoreDC
ExcludeClipRect
IntersectClipRect
CreateRectRgn
GetTextExtentPoint32W
RoundRect
Ellipse
SetWorldTransform
GetWorldTransform
SetROP2
Polyline
Arc
Pie
CreatePen
ExtCreatePen
CreatePatternBrush
GetClipRgn
GetViewportOrgEx
GetCurrentObject
advapi32
RegSaveKeyW
RegDeleteKeyA
RegQueryInfoKeyW
RegEnumValueA
RegSaveKeyA
RegEnumKeyExA
RegRestoreKeyA
RevertToSelf
ImpersonateLoggedOnUser
AdjustTokenPrivileges
RegOpenKeyA
LookupPrivilegeValueA
RegQueryValueExA
OpenProcessToken
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
RegRestoreKeyW
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
RegDeleteValueA
RegQueryValueA
RegCloseKey
RegCreateKeyExA
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
Shell_NotifyIconW
Shell_NotifyIconA
CommandLineToArgvW
SHGetSpecialFolderPathA
SHGetPathFromIDListW
SHFileOperationW
ShellExecuteW
SHBrowseForFolderW
ole32
OleCreate
StgCreateDocfile
CoTaskMemRealloc
CoTaskMemAlloc
CoGetClassObject
CreateStreamOnHGlobal
StringFromGUID2
CreateBindCtx
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
OleLockRunning
oleaut32
VarUI4FromStr
LoadRegTypeLi
OleCreateFontIndirect
SysAllocStringLen
VariantInit
LoadTypeLi
VariantClear
SysStringLen
SysFreeString
SysAllocString
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
shlwapi
PathFileExistsA
StrToIntExW
StrStrIA
wininet
HttpQueryInfoA
InternetConnectA
InternetReadFileExA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
netapi32
Netbios
psapi
GetProcessImageFileNameA
imagehlp
MakeSureDirectoryPathExists
imm32
ImmGetContext
ImmAssociateContext
ImmReleaseContext
gdiplus
GdipSaveImageToFile
GdiplusStartup
GdipImageGetFrameCount
GdipCreatePen1
GdipGetImageWidth
GdipDrawLineI
GdipCloneImage
GdipFillRectangleI
GdipImageGetFrameDimensionsCount
GdipCreateFromHDC
GdipGetPropertyItemSize
GdipCreateBitmapFromFile
GdipDisposeImage
GdipAlloc
GdipCreateSolidFill
GdipGetPropertyItem
GdipImageSelectActiveFrame
GdipGraphicsClear
GdipImageGetFrameDimensionsList
GdipDrawImageRectI
GdipDeleteGraphics
GdipGetImageHeight
GdipCreateBitmapFromFileICM
GdipCloneBrush
GdipDeletePen
GdipFree
GdipDeleteBrush
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipGetImageGraphicsContext
GdiplusShutdown
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
comctl32
_TrackMouseEvent
InitCommonControlsEx
msimg32
GradientFill
AlphaBlend
ws2_32
getpeername
getsockopt
htons
bind
ntohs
getsockname
setsockopt
WSAIoctl
send
select
WSAGetLastError
__WSAFDIsSet
WSASetLastError
WSAStartup
WSACleanup
socket
connect
freeaddrinfo
getaddrinfo
sendto
recvfrom
accept
listen
ioctlsocket
gethostname
shutdown
closesocket
recv
wldap32
ord301
ord33
ord41
ord46
ord79
ord35
ord32
ord200
ord30
ord26
ord50
ord60
ord22
ord211
ord27
ord143
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 568KB - Virtual size: 568KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 106KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 350KB - Virtual size: 350KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ