Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2023 14:04
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_0041d29a16978674290b6f76f90e9d71_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_0041d29a16978674290b6f76f90e9d71_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_0041d29a16978674290b6f76f90e9d71_mafia_JC.exe
-
Size
444KB
-
MD5
0041d29a16978674290b6f76f90e9d71
-
SHA1
72e326d5973fb053c3e38e29589bee5ec0d8a889
-
SHA256
ba0a32b6d7ae4037de091ccfdda59e91a56fb68def0a074ad05fe3efd3642ce7
-
SHA512
4d83361ae8e85dc338633d0a33e2371aa852977e30c71cb2c01b0a52f51b79de9c0810ece5652d3f186c492026d06e1ecdc826c8d2417651094f2730eb998968
-
SSDEEP
12288:Nb4bZudi79L2x/aaQ9DlHE5N12repYb9N7uA:Nb4bcdkLE4X+7oeY9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3604 B0B2.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3596 wrote to memory of 3604 3596 2023-08-27_0041d29a16978674290b6f76f90e9d71_mafia_JC.exe 84 PID 3596 wrote to memory of 3604 3596 2023-08-27_0041d29a16978674290b6f76f90e9d71_mafia_JC.exe 84 PID 3596 wrote to memory of 3604 3596 2023-08-27_0041d29a16978674290b6f76f90e9d71_mafia_JC.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-27_0041d29a16978674290b6f76f90e9d71_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-27_0041d29a16978674290b6f76f90e9d71_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\B0B2.tmp"C:\Users\Admin\AppData\Local\Temp\B0B2.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2023-08-27_0041d29a16978674290b6f76f90e9d71_mafia_JC.exe 55EFFB8CE645263173770956DE65C5AB4E988BF7817CA002685E045FBD711DCA55F3A33C9C850053E093985CB048948C5AD181CBFAB0AD6C330C05BA680FCC7C2⤵
- Executes dropped EXE
PID:3604
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD5a78a72093e8caeb73dc2ed1cebe4233a
SHA189ffed41419babdebcc32099af87edbffd4696f0
SHA256369b018aaca3416d1da991d707e10d1b401261b71077c94090c49becc628488a
SHA5125688b284c15039d2a628c1710b06f9a9e4ea88bfe7325636a17440aa2e98a8d9ef7d120d4f3d576c034ca71d63db5516e2782e2cc268ff2316ca31e6e74740b5
-
Filesize
444KB
MD5a78a72093e8caeb73dc2ed1cebe4233a
SHA189ffed41419babdebcc32099af87edbffd4696f0
SHA256369b018aaca3416d1da991d707e10d1b401261b71077c94090c49becc628488a
SHA5125688b284c15039d2a628c1710b06f9a9e4ea88bfe7325636a17440aa2e98a8d9ef7d120d4f3d576c034ca71d63db5516e2782e2cc268ff2316ca31e6e74740b5