Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03/08/2023, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe
-
Size
414KB
-
MD5
4842557970d9bd0a73e6fc4824c0ba6d
-
SHA1
11de60cdd397c7d7449e4a844c87d6cc1933a032
-
SHA256
6bfc47c1a6abaaa9f3cf6ddee9fccd9db65ad7d68dbb0b03558782353630bef0
-
SHA512
f8769e39e47f5c487aecc353ad05d832d40bfd0c0699bbcc26474ec5ee06480aec8bc21a14d07abd28ded441ad7e9b8540cddf944e94a0b5f87358db3e9cb50b
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYzCPkCDit97GVY28HO+VmhdKwQcLS+iq7FMDlx:Wq4w/ekieZgU6YCHetgKlmKvcLFFilx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2112 74B3.tmp -
Executes dropped EXE 1 IoCs
pid Process 2112 74B3.tmp -
Loads dropped DLL 1 IoCs
pid Process 1580 4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2112 1580 4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe 28 PID 1580 wrote to memory of 2112 1580 4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe 28 PID 1580 wrote to memory of 2112 1580 4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe 28 PID 1580 wrote to memory of 2112 1580 4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\74B3.tmp"C:\Users\Admin\AppData\Local\Temp\74B3.tmp" --helpC:\Users\Admin\AppData\Local\Temp\4842557970d9bd0a73e6fc4824c0ba6d_mafia_JC.exe 3DDEE8FFD2CE97827B723399BE518BBD06C65730FE698924C0E0B0A79D1BD5335451282268748AD414891E10090F8834D2BEA1251A0CFF95F21312A088DE3B102⤵
- Deletes itself
- Executes dropped EXE
PID:2112
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5e8530d5cb429a417c261f6c29786f930
SHA12a2ab2dcc96304c2be3a1e7818c8263ac71b680c
SHA2565babc8f9d5a41dc78ae59de673b013ae500ca8c8c97973b11b90baa9f4e73f13
SHA512e8bf1ae32705a38a6626956e76b88896e0f57869b091da7dc4e091ffbd331745951bb723a6becc400fe39e538d506461ce187df6dbd25daee8b7e38e5b6e7f4d
-
Filesize
414KB
MD5e8530d5cb429a417c261f6c29786f930
SHA12a2ab2dcc96304c2be3a1e7818c8263ac71b680c
SHA2565babc8f9d5a41dc78ae59de673b013ae500ca8c8c97973b11b90baa9f4e73f13
SHA512e8bf1ae32705a38a6626956e76b88896e0f57869b091da7dc4e091ffbd331745951bb723a6becc400fe39e538d506461ce187df6dbd25daee8b7e38e5b6e7f4d