Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe
Resource
win10v2004-20230824-en
General
-
Target
d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe
-
Size
443KB
-
MD5
d09a383f6ef16e60531410b0ed7d8719
-
SHA1
c941475aec3a2d8953288e88cc8fc2409ae803c6
-
SHA256
05d1f3902e192f3ec6cc8ee4bbc915ee5167744a4f64522e4e8efe62c4284563
-
SHA512
47f3fcbfee86644730b10d53205d669b4aac15b5b9f9073aca7bd00e944cde551dd7199e49a4b401786e3d08f1f603b4be3aa413a2bd189cf154d543675fbd7c
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYlGg/SYpBuMYRr6NrgTzZTPWfWrlMa:Wq4w/ekieZgU6oGg1pBuB+6rlMa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1296 9EE.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 1296 4248 d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe 85 PID 4248 wrote to memory of 1296 4248 d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe 85 PID 4248 wrote to memory of 1296 4248 d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\9EE.tmp"C:\Users\Admin\AppData\Local\Temp\9EE.tmp" --helpC:\Users\Admin\AppData\Local\Temp\d09a383f6ef16e60531410b0ed7d8719_mafia_JC.exe 472E3FA31572CD12D00F4D4F6C22B993AE64410C66EF0A5CC013DC592135B9E9EB1493B1A41DE112C59A2213854B3001C06830B2EC1DCA29C368EB93890F6E1B2⤵
- Executes dropped EXE
PID:1296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD5d84d78cb7a3fafee93986ffb805fb54a
SHA12877bb714f718a16688af9c6865aa25074488685
SHA256109598e985fedb4396132b313d0d4d9f79ce006e5202d51a413e9578eb026d78
SHA512554df5cf1bf7e4321f8518e4c3b9f155f287c55bd6be789b3bbbfe15cb4d699fe496c6bd0e5f544de0b0efd90f6b52b3b684790d308c297f787f6bd7ff02d339
-
Filesize
443KB
MD5d84d78cb7a3fafee93986ffb805fb54a
SHA12877bb714f718a16688af9c6865aa25074488685
SHA256109598e985fedb4396132b313d0d4d9f79ce006e5202d51a413e9578eb026d78
SHA512554df5cf1bf7e4321f8518e4c3b9f155f287c55bd6be789b3bbbfe15cb4d699fe496c6bd0e5f544de0b0efd90f6b52b3b684790d308c297f787f6bd7ff02d339