?keyBrdEvent@@YGJHIJ@Z
?mouseEvent@@YGJHIJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-08_c13d4a6f1ff56d41571348654c86b2af_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-08_c13d4a6f1ff56d41571348654c86b2af_mafia_JC.exe
Resource
win10v2004-20231023-en
Target
NEAS.2023-09-08_c13d4a6f1ff56d41571348654c86b2af_mafia_JC.exe
Size
804KB
MD5
c13d4a6f1ff56d41571348654c86b2af
SHA1
2836003704066e2d093f25b3f52ca028c6803322
SHA256
0cbb743d90db640864bba3eda1fe43a1c7a429d09e9c822779d8ee315a9791a9
SHA512
86a6ad1c2b215e3f2bb9b88228778d61fad593adaf06ac3c9e5db2eed37227824a102b7d59cda287d3fc5981e85d26f51c228e196d2f60787598f8a974b433fe
SSDEEP
12288:s30U4u2cnHbph5BjeyXrjD36DKzG5QC4bUcpIbd7YCP6:s309cnxFnn6DKSeLIb
Checks for missing Authenticode signature.
resource |
---|
NEAS.2023-09-08_c13d4a6f1ff56d41571348654c86b2af_mafia_JC.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WTSUnRegisterSessionNotification
WTSRegisterSessionNotification
GetVersionExA
GetVersion
WaitForSingleObject
WaitForMultipleObjects
ResetEvent
ReleaseMutex
CreateMutexW
CreateEventW
GetTimeZoneInformation
TryEnterCriticalSection
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
WriteConsoleW
LoadLibraryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateThread
GetStringTypeW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WriteFile
ExitProcess
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetModuleHandleA
GetCurrentThreadId
CloseHandle
GetCurrentProcess
GetLastError
CreateDirectoryA
GetPrivateProfileStringA
Sleep
SetEvent
CompareStringW
GetLocaleInfoW
HeapReAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
IsProcessorFeaturePresent
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetCommandLineA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapDestroy
HeapAlloc
HeapFree
SetEnvironmentVariableA
HeapSize
GetProcessHeap
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
GetLocalTime
VirtualProtect
VirtualAlloc
GetProcAddress
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetMessageA
BeginPaint
SetWindowsHookExA
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
UnhookWindowsHookEx
EndPaint
TranslateAcceleratorA
RegisterWindowMessageA
DestroyWindow
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
GetMenuItemID
LoadMenuA
GetSubMenu
DestroyMenu
SetMenuDefaultItem
LoadStringA
LoadAcceleratorsA
RegisterClassExA
CreateWindowExA
LockWorkStation
LoadIconA
LoadCursorA
CallNextHookEx
GetUserNameA
GetSidLengthRequired
InitializeSid
EqualSid
CopySid
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
GetLengthSid
OpenProcessToken
GetTokenInformation
SHCreateDirectoryExA
Shell_NotifyIconA
SHGetFolderPathA
PathAppendA
UnloadUserProfile
ntohs
htons
getservbyname
ntohl
inet_addr
__WSAFDIsSet
select
accept
connect
bind
listen
closesocket
shutdown
send
recv
sendto
recvfrom
getsockname
getpeername
setsockopt
getsockopt
socket
ioctlsocket
freeaddrinfo
getaddrinfo
getnameinfo
gethostname
WSACleanup
WSALookupServiceEnd
WSALookupServiceNextA
WSALookupServiceBeginA
WSAGetLastError
WSAStartup
WSAAddressToStringA
?keyBrdEvent@@YGJHIJ@Z
?mouseEvent@@YGJHIJ@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ