Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05/08/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
700d5d5544647369c77816989579dc55_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
700d5d5544647369c77816989579dc55_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
700d5d5544647369c77816989579dc55_mafia_JC.exe
-
Size
412KB
-
MD5
700d5d5544647369c77816989579dc55
-
SHA1
f3b138e48e635afdcbc4ade28b209b7339e76129
-
SHA256
bb2add91540dee429f9449f6b50a2a030f770abc277d24102cb7a745e1159a8a
-
SHA512
faf82dff065eb3ba126371a6861cf745ecb3270ecc54be4a2e9a41845a6e879658d00fbde271fb7da9cc6aeec3078392b6cb00bc58ec87ad3493cd91b92fe134
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnAe+RD6GT1PwIeeYo2dEqTXp59AO5P:U6PCrIc9kph5S5pT1PANdEq559pJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2924 690F.tmp -
Executes dropped EXE 1 IoCs
pid Process 2924 690F.tmp -
Loads dropped DLL 1 IoCs
pid Process 2832 700d5d5544647369c77816989579dc55_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2924 2832 700d5d5544647369c77816989579dc55_mafia_JC.exe 28 PID 2832 wrote to memory of 2924 2832 700d5d5544647369c77816989579dc55_mafia_JC.exe 28 PID 2832 wrote to memory of 2924 2832 700d5d5544647369c77816989579dc55_mafia_JC.exe 28 PID 2832 wrote to memory of 2924 2832 700d5d5544647369c77816989579dc55_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\700d5d5544647369c77816989579dc55_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\700d5d5544647369c77816989579dc55_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\690F.tmp"C:\Users\Admin\AppData\Local\Temp\690F.tmp" --pingC:\Users\Admin\AppData\Local\Temp\700d5d5544647369c77816989579dc55_mafia_JC.exe CBFD798C1177030779EDD2524AD3692545C098DE8553817FB7843EAFE09C53CE76E940447A39DE6D96B8F83A0299F4DE8EDC21FAD8493BBF85B016123B6FDB4B2⤵
- Deletes itself
- Executes dropped EXE
PID:2924
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5bf916101c1d13f91eb1e25d39bffa8a4
SHA1e6b90aaf79b4a563716273343156ea3645147c94
SHA256356a7fa44844a105361fa1a8c66e17077ccee5d9b45bf15f641de45a253144c1
SHA512ee33a58996f0222f362c38f07762fc9c558bef3b6c977b2aa9e08d53cfdf78381cf4adf9c66cd2af8780fae2368ff114d4ff8f14e6ff3596a0244182936107a5
-
Filesize
412KB
MD5bf916101c1d13f91eb1e25d39bffa8a4
SHA1e6b90aaf79b4a563716273343156ea3645147c94
SHA256356a7fa44844a105361fa1a8c66e17077ccee5d9b45bf15f641de45a253144c1
SHA512ee33a58996f0222f362c38f07762fc9c558bef3b6c977b2aa9e08d53cfdf78381cf4adf9c66cd2af8780fae2368ff114d4ff8f14e6ff3596a0244182936107a5