Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
29/08/2023, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe
Resource
win10v2004-20230824-en
General
-
Target
d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe
-
Size
443KB
-
MD5
d09a383f6ef16e60531410b0ed7d8719
-
SHA1
c941475aec3a2d8953288e88cc8fc2409ae803c6
-
SHA256
05d1f3902e192f3ec6cc8ee4bbc915ee5167744a4f64522e4e8efe62c4284563
-
SHA512
47f3fcbfee86644730b10d53205d669b4aac15b5b9f9073aca7bd00e944cde551dd7199e49a4b401786e3d08f1f603b4be3aa413a2bd189cf154d543675fbd7c
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYlGg/SYpBuMYRr6NrgTzZTPWfWrlMa:Wq4w/ekieZgU6oGg1pBuB+6rlMa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2568 79E1.tmp -
Executes dropped EXE 1 IoCs
pid Process 2568 79E1.tmp -
Loads dropped DLL 1 IoCs
pid Process 2544 d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2568 2544 d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe 28 PID 2544 wrote to memory of 2568 2544 d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe 28 PID 2544 wrote to memory of 2568 2544 d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe 28 PID 2544 wrote to memory of 2568 2544 d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\79E1.tmp"C:\Users\Admin\AppData\Local\Temp\79E1.tmp" --helpC:\Users\Admin\AppData\Local\Temp\d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe FD0B8731187103BFBF7B2B0291D30F76EDB880B3397B2FB7AC9FCD95BA782E47133FA12733C58733869242D6952962C4B546D357E43FC4E379F674D782A373232⤵
- Deletes itself
- Executes dropped EXE
PID:2568
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD50dc7ab79381897f6131291211cc56e77
SHA1d94f219df0b7bbc73a7c8709fe8a07bd31c3d721
SHA256f154b2a0e93aada11e44e11a264fe8c6eca14e0c05d684d5f850205233b34243
SHA5129cac6e5c61ceeb729fd6df586e6d80af15919ddaa6a134cfac890db8d9893d477379ac33cee835aeab3d0acc74093a50c481f31cb6dc9376ab74e4101cccb78a
-
Filesize
443KB
MD50dc7ab79381897f6131291211cc56e77
SHA1d94f219df0b7bbc73a7c8709fe8a07bd31c3d721
SHA256f154b2a0e93aada11e44e11a264fe8c6eca14e0c05d684d5f850205233b34243
SHA5129cac6e5c61ceeb729fd6df586e6d80af15919ddaa6a134cfac890db8d9893d477379ac33cee835aeab3d0acc74093a50c481f31cb6dc9376ab74e4101cccb78a