Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01/08/2023, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
275137a215f685d6668c41ce305eb226_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
275137a215f685d6668c41ce305eb226_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
275137a215f685d6668c41ce305eb226_mafia_JC.exe
-
Size
428KB
-
MD5
275137a215f685d6668c41ce305eb226
-
SHA1
29e69501169253b010847616033ceb37de3f6274
-
SHA256
e392b7b4b993ad7b1fd9948537a52e7dc62ed2bbe2eb581e0d5c0bb9e50d9f41
-
SHA512
12d096052cecb092a54ca3e201da137488ca1f48deadfdd1636c6be98116a9dfdb4e96b035c0f04db9c5c114fecd6941fd2f174f886967c68774f3705e96a72d
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFpmf2jUAiWvTWgUb/ZFp0G5dJv51sugzqHR:gZLolhNVyE2maUAiWvF4mUrfsuGqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2420 CE57.tmp -
Executes dropped EXE 1 IoCs
pid Process 2420 CE57.tmp -
Loads dropped DLL 1 IoCs
pid Process 2508 275137a215f685d6668c41ce305eb226_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2420 2508 275137a215f685d6668c41ce305eb226_mafia_JC.exe 28 PID 2508 wrote to memory of 2420 2508 275137a215f685d6668c41ce305eb226_mafia_JC.exe 28 PID 2508 wrote to memory of 2420 2508 275137a215f685d6668c41ce305eb226_mafia_JC.exe 28 PID 2508 wrote to memory of 2420 2508 275137a215f685d6668c41ce305eb226_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\275137a215f685d6668c41ce305eb226_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\275137a215f685d6668c41ce305eb226_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\CE57.tmp"C:\Users\Admin\AppData\Local\Temp\CE57.tmp" --pingC:\Users\Admin\AppData\Local\Temp\275137a215f685d6668c41ce305eb226_mafia_JC.exe 621986C90F69566B81AE512BC9A16C953E33CA2942CAED1EDF9F3631B421D0CE8ED47D2CB3934A2593EB29B945E6B3E60008844A632CEF11F5C93A9CA80E31782⤵
- Deletes itself
- Executes dropped EXE
PID:2420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD572120affad9df683d90978ae1d99244e
SHA11c4eb8e69f82ec6b597fb93ddb0d70f9b9315a71
SHA2563e5efbe1c07fefabbb8175de0d6aa570f6e1ffc4d98aea12804f95bb91909664
SHA512a09bbefd5d34fc6507d9376c416c4e61ec92ccc98eebe721571b1b082663c208504fbbc2937730636a4b7791a069eec8d10a14d231b37a9b75bfc5e9f2d3b272
-
Filesize
428KB
MD572120affad9df683d90978ae1d99244e
SHA11c4eb8e69f82ec6b597fb93ddb0d70f9b9315a71
SHA2563e5efbe1c07fefabbb8175de0d6aa570f6e1ffc4d98aea12804f95bb91909664
SHA512a09bbefd5d34fc6507d9376c416c4e61ec92ccc98eebe721571b1b082663c208504fbbc2937730636a4b7791a069eec8d10a14d231b37a9b75bfc5e9f2d3b272