Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_4e1394a41d645a9f19d6c510e52f655b_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_4e1394a41d645a9f19d6c510e52f655b_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_4e1394a41d645a9f19d6c510e52f655b_mafia_JC.exe
-
Size
132KB
-
MD5
4e1394a41d645a9f19d6c510e52f655b
-
SHA1
0c82a26949976c04b3662f92efae83c4578f98a7
-
SHA256
4d7ba3ed1cd90b27c55d144ae64aa9213d09dca71f64804c03d1584176517935
-
SHA512
c7cb17f0677ef2c9ce57f6115d16ba0c30d96a64bbad16ae43c5134c476e6225689cf09a9d5fe44e71543c78a8028c35fee48445432d9b8c6485501ad2146549
-
SSDEEP
1536:XG1pwlrYKXePVIOun5nlvolOKxaD49RmqMertflSG+FRCaV:cQ8Ps9+vmErtdmFRZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-25_4e1394a41d645a9f19d6c510e52f655b_mafia_JC.exe
Files
-
2023-08-25_4e1394a41d645a9f19d6c510e52f655b_mafia_JC.exe.exe windows:5 windows x86
493418cecf31c00f75763b2612b7560e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadIconA
DispatchMessageA
TranslateMessage
PeekMessageA
UpdateWindow
ShowWindow
CreateWindowExA
GetDesktopWindow
PostQuitMessage
DefWindowProcA
UnregisterClassA
LoadCursorA
RegisterClassExA
MessageBoxA
gdi32
GetStockObject
winmm
timeGetTime
d3dx9_42
D3DXVec3Normalize
D3DXMatrixLookAtLH
D3DXMatrixPerspectiveFovLH
D3DXMatrixTranspose
D3DXMatrixInverse
D3DXMatrixDeterminant
d3d9
Direct3DCreate9
kernel32
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
HeapAlloc
HeapSize
IsValidLocale
GetStringTypeW
MultiByteToWideChar
LCMapStringW
RtlUnwind
Sleep
HeapFree
RaiseException
SetHandleCount
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ