Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 20:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe
-
Size
433KB
-
MD5
2765b7e57f8d25e436f1431312274f22
-
SHA1
7167640506d72f2b7a6a428abd2fde186baa65d3
-
SHA256
54981433f16cc8ec9c597bc1e0d2be9be2b308b4d39263eb784150ec5e7872eb
-
SHA512
ece908eed4fec087e770e242f9c311b748601f756847bf571f80d26d2c2b9d55023f6f9ff7b5b5303fc7947d0717c81f4bd52b5db3c2b813ab685074f6603769
-
SSDEEP
12288:Ci4g+yU+0pAiv+rL7BmD0/6XBhd86/MjjnR3yyZj/kFn:Ci4gXn0pD+kDvXDM4yNg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2100 3C74.tmp -
Executes dropped EXE 1 IoCs
pid Process 2100 3C74.tmp -
Loads dropped DLL 1 IoCs
pid Process 1696 NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2100 1696 NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe 28 PID 1696 wrote to memory of 2100 1696 NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe 28 PID 1696 wrote to memory of 2100 1696 NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe 28 PID 1696 wrote to memory of 2100 1696 NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3C74.tmp"C:\Users\Admin\AppData\Local\Temp\3C74.tmp" --helpC:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_2765b7e57f8d25e436f1431312274f22_mafia_JC.exe AB23153545D2F7090FEC5749869F16BFE0440DE2A4B48ADBBE0E3820EAE357912384AEF7FC15EAD076BF825AFDC2985C6C9FC047F64A353851B7C5D70FC05ED32⤵
- Deletes itself
- Executes dropped EXE
PID:2100
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5350f6fa1845470b8b15b8f1588e4c2ab
SHA17b700180a3f464a430a8aac814cc0b814c8291d7
SHA256cc87065e6860eceb50cdce37d70ab23e7d3e45f36a612fe966064b69d08f74ef
SHA5129fba240b9931431c149860701f3177e2100a78afd27b4418471b035fd14c375537506135aec8f25f1a3502bdeb5dbf05a301e16b385ba7d29426a3975a58fd7f
-
Filesize
433KB
MD5350f6fa1845470b8b15b8f1588e4c2ab
SHA17b700180a3f464a430a8aac814cc0b814c8291d7
SHA256cc87065e6860eceb50cdce37d70ab23e7d3e45f36a612fe966064b69d08f74ef
SHA5129fba240b9931431c149860701f3177e2100a78afd27b4418471b035fd14c375537506135aec8f25f1a3502bdeb5dbf05a301e16b385ba7d29426a3975a58fd7f