Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17-08-2023 18:48
Static task
static1
Behavioral task
behavioral1
Sample
2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe
-
Size
433KB
-
MD5
2167fb7f0ea899dd4e7498878f24d634
-
SHA1
c11c18fb53c67debd435cf5c15756fd8e080e8f3
-
SHA256
b4eeae4178b46a796a824a579f2b812e8b970a8c5027b7affa6bfdc37a4e85d9
-
SHA512
d6f1bd1b1a245a1edfc51d836084e00d91e32c03540762cdb628fb3098f2dca8f5c05cad1ef632084924a52a34641593261952d9c54e507c915a229effb72ddf
-
SSDEEP
12288:Ci4g+yU+0pAiv+H1tjkFpnXVih9PAAB0AK80NdZn:Ci4gXn0pD+VtgF9XVih9PRDN0zB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2296 7955.tmp -
Executes dropped EXE 1 IoCs
pid Process 2296 7955.tmp -
Loads dropped DLL 1 IoCs
pid Process 2412 2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2296 2412 2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe 28 PID 2412 wrote to memory of 2296 2412 2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe 28 PID 2412 wrote to memory of 2296 2412 2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe 28 PID 2412 wrote to memory of 2296 2412 2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\7955.tmp"C:\Users\Admin\AppData\Local\Temp\7955.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2167fb7f0ea899dd4e7498878f24d634_mafia_JC.exe B5A948CAAF8C884C8E216C6EC6E95197EE65F0CFBC725151A0FAC00B3300E2347B00B84DE04759A0D30EBBBF74FD1EA1EEF177D1EC69FE74E2650204239C6FFC2⤵
- Deletes itself
- Executes dropped EXE
PID:2296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5cfcfb95040602cdc4a0a843d3d5fca83
SHA111f4feff5289f47b48350b094b541df90abbff13
SHA256bbf1103ec70b8da13b34a75f65cafc4463c5f32e52d096e20b7c086ad5ccc5e6
SHA51265863873ef4acbbbb7fccf29dc0745c4a3a27f92059bd95e261691ab362f87d07102fdaee0067ada9cbeedd2331667fe9837fe7f3cbe62550f2f2f164caab95f
-
Filesize
433KB
MD5cfcfb95040602cdc4a0a843d3d5fca83
SHA111f4feff5289f47b48350b094b541df90abbff13
SHA256bbf1103ec70b8da13b34a75f65cafc4463c5f32e52d096e20b7c086ad5ccc5e6
SHA51265863873ef4acbbbb7fccf29dc0745c4a3a27f92059bd95e261691ab362f87d07102fdaee0067ada9cbeedd2331667fe9837fe7f3cbe62550f2f2f164caab95f