Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe
-
Size
414KB
-
MD5
a22e08a30412f782e34fbdba6530c4d8
-
SHA1
cc787d8157fa6c8a054cc06edf43d84d259deaa5
-
SHA256
14c01b6147acef473607a74d6c7905f03e53423e5d5b3bec47a17b6b6b2e4e32
-
SHA512
8384312a01850d776086644dc51b8f0106d830d7ff5b6952f741c1a701c6f69dee8d6ba5a2878072e19bfd19aa53b51edaab2b031991fd9986979ddf82e86381
-
SSDEEP
12288:Wq4w/ekieZgU6qnJDPWZvN1FW295CXKal:Wq4w/ekieH6eBUv3P0aa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1624 7F3E.tmp -
Executes dropped EXE 1 IoCs
pid Process 1624 7F3E.tmp -
Loads dropped DLL 1 IoCs
pid Process 2320 a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1624 2320 a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe 28 PID 2320 wrote to memory of 1624 2320 a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe 28 PID 2320 wrote to memory of 1624 2320 a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe 28 PID 2320 wrote to memory of 1624 2320 a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\7F3E.tmp"C:\Users\Admin\AppData\Local\Temp\7F3E.tmp" --helpC:\Users\Admin\AppData\Local\Temp\a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe A0AACAA5345C52425275EEE4F0AD879598D87CEEE36B2E4706CD1E16A479AAC0DCE76D7A060B078917E7BFE2E40DF5F294334E1B4B7E539F6C57E8A709F1474E2⤵
- Deletes itself
- Executes dropped EXE
PID:1624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD55a3ffc34565341094b4bdb54f25f039f
SHA15ea452a46a126f33b609262ee7ad6eb787bd6995
SHA2562b28a9e6d87b7b6ae42ff4067b9d958868dfc0a385a8b5c33476788164337ed9
SHA5123de9c9e096cece00e545c95cfd6df1fdb2c98fba41e3858416ff274eb382d129b818cfa5e76686bf7bbd35f434813911d84d9a146a623c64872978e52007ff91
-
Filesize
414KB
MD55a3ffc34565341094b4bdb54f25f039f
SHA15ea452a46a126f33b609262ee7ad6eb787bd6995
SHA2562b28a9e6d87b7b6ae42ff4067b9d958868dfc0a385a8b5c33476788164337ed9
SHA5123de9c9e096cece00e545c95cfd6df1fdb2c98fba41e3858416ff274eb382d129b818cfa5e76686bf7bbd35f434813911d84d9a146a623c64872978e52007ff91