Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-08_2c970d5cdc7d91a4231a8b407b24224a_mafia_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-08_2c970d5cdc7d91a4231a8b407b24224a_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-08_2c970d5cdc7d91a4231a8b407b24224a_mafia_JC.exe
-
Size
1017KB
-
MD5
2c970d5cdc7d91a4231a8b407b24224a
-
SHA1
daa5440184dfbbe64a0451559d58b16a6850e588
-
SHA256
314b15f9a44628074630876b5dea4abeadde5537b939e578ef77af818b0257ae
-
SHA512
222b9ee87f2b2b11b3114d1a71c98bd4e1637d818278e860e92eda4ab37763f26f8d38cc9b654902ab9bb8cf8b8e0c685185b4cfdad8fc36e6a79a1e03c9c080
-
SSDEEP
24576:M260e2xD6YC2soB+KXALM2CrFrTrHd8fyjYdcnV5Tp:M262ycXALM/9f98fyjPnV5Tp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.2023-09-08_2c970d5cdc7d91a4231a8b407b24224a_mafia_JC.exe
Files
-
NEAS.2023-09-08_2c970d5cdc7d91a4231a8b407b24224a_mafia_JC.exe.exe windows:5 windows x86
3280e1c37611b8bc14ddefca7d8c6b1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
RpcStringFreeW
UuidToStringW
winhttp
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpOpenRequest
comctl32
InitCommonControlsEx
urlmon
URLDownloadToCacheFileW
wininet
InternetOpenW
InternetConnectW
InternetReadFile
InternetCrackUrlW
InternetCloseHandle
InternetOpenUrlW
InternetSetOptionW
HttpSendRequestW
HttpQueryInfoW
InternetSetStatusCallbackW
HttpAddRequestHeadersW
HttpOpenRequestW
ws2_32
WSAStartup
WSACleanup
gdiplus
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromFile
GdipDisposeImage
GdipFree
GdiplusStartup
GdipAlloc
GdipCloneImage
GdiplusShutdown
kernel32
GetCurrentDirectoryW
FlushFileBuffers
LoadLibraryW
GetConsoleMode
GetCurrentProcessId
GetLocaleInfoW
SetFilePointer
GetConsoleCP
SetHandleCount
LocalFree
lstrlenA
CreateFileA
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
WaitForSingleObject
CloseHandle
CreateThread
WideCharToMultiByte
GetModuleFileNameW
MultiByteToWideChar
GetLastError
Sleep
GetFileAttributesW
CreateFileW
InterlockedDecrement
DeviceIoControl
GetVolumeInformationW
GetVersionExW
ReleaseMutex
CreateMutexW
FindFirstFileW
SystemTimeToFileTime
FindNextFileW
OutputDebugStringA
GetSystemTime
GetCommandLineW
GetModuleHandleW
RemoveDirectoryW
CreateDirectoryW
GetDiskFreeSpaceExW
DeleteFileW
GetTickCount
GetLocalTime
GetUserDefaultLangID
GlobalAlloc
GlobalFree
GetCurrentProcess
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapFree
GetDriveTypeW
GetFullPathNameA
HeapAlloc
GetProcAddress
ExitProcess
GetSystemTimeAsFileTime
ReadFile
SetEndOfFile
GetProcessHeap
HeapReAlloc
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
CompareStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
SetStdHandle
user32
DispatchMessageW
GetSystemMetrics
SetWindowTextW
MessageBoxW
CreateDialogParamW
LoadBitmapW
SetWindowLongW
GetDlgItem
GetWindowLongW
IsDialogMessageW
TranslateMessage
MoveWindow
LoadImageW
GetMessageW
GetWindowRect
DestroyWindow
IsWindow
GetCursorPos
IsWindowUnicode
PeekMessageW
GetClientRect
EnableWindow
SendMessageW
FlashWindow
ShowWindow
SetWindowPos
GetDesktopWindow
ReleaseDC
GetWindowTextW
InvalidateRect
GetDC
GetParent
ScreenToClient
GetWindowTextLengthW
PostMessageW
gdi32
GetObjectW
CreateFontIndirectW
SetMapMode
SelectObject
GetTextExtentPoint32W
DeleteObject
advapi32
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegDeleteKeyW
RegOpenKeyExW
shell32
ord165
CommandLineToArgvW
SHFileOperationW
SHGetPathFromIDListW
ShellExecuteW
SHGetMalloc
SHGetFolderPathW
ShellExecuteExW
SHBrowseForFolderW
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
oleaut32
SysAllocString
SysStringLen
SysFreeString
VariantClear
VariantInit
Sections
.text Size: 580KB - Virtual size: 579KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ