Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03-10-2023 17:07
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe
-
Size
384KB
-
MD5
729701ca6ab4679f45bc0191b8c072f0
-
SHA1
e7505bde4aa3ae60d7f81c404c615ee44d48d804
-
SHA256
35a81e0d19f009dd18d4af6c5a234db7642705ec6c77639e5e8afceeb50e5237
-
SHA512
941edfae930c85daafa304e7fa4379fa66ab0c96021fdf77fc5cf69cbd2daf470a3c55ebdd586e2cc301b285bb25079a2085a12addab3c801b66dee7f4151bb4
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hH+O81+OgO5tftD8aoEPVG4kewZ6397MsT08lZ:Zm48gODxbzEv+dGJ8P/41wTZ8lZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2280 7417.tmp -
Executes dropped EXE 1 IoCs
pid Process 2280 7417.tmp -
Loads dropped DLL 1 IoCs
pid Process 3004 2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2280 3004 2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe 28 PID 3004 wrote to memory of 2280 3004 2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe 28 PID 3004 wrote to memory of 2280 3004 2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe 28 PID 3004 wrote to memory of 2280 3004 2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\7417.tmp"C:\Users\Admin\AppData\Local\Temp\7417.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe F38D7B9301756DD0A85D6D79F1AF8962BD05EFD52447F37A609E3CCD7EBB79588867BE0DE76F3FB6EEE9404B030461D4B05E34FABCBAA8D7887B341A8E6922212⤵
- Deletes itself
- Executes dropped EXE
PID:2280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5cae2a058925c1772c5595e027e953919
SHA105dfa649a256dfca216c57bd4746cf261c77b014
SHA2565be6380b1df2c2eb836c7ab4f9d118c4d991e611b689e3e48a2854b59e14d3bd
SHA51241190aafa8e4c34b0989137de85347ea028e60107007c0f1c03917863baea6dc3691556d1e26b7ce06e81e8d756df47bee9c52ef0ca305a6c7e9c1bd2158a96f
-
Filesize
384KB
MD5cae2a058925c1772c5595e027e953919
SHA105dfa649a256dfca216c57bd4746cf261c77b014
SHA2565be6380b1df2c2eb836c7ab4f9d118c4d991e611b689e3e48a2854b59e14d3bd
SHA51241190aafa8e4c34b0989137de85347ea028e60107007c0f1c03917863baea6dc3691556d1e26b7ce06e81e8d756df47bee9c52ef0ca305a6c7e9c1bd2158a96f