Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 06:47
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe
-
Size
428KB
-
MD5
0322959d7a4d271cd4d73ea4e8aa794b
-
SHA1
71f5358747f3b29cf343e0cbd86232d91d154774
-
SHA256
57676d8a2ae5a8bb8e178871c7701e99b69d0714865cf62a0f1f2537cd795164
-
SHA512
a12dbeddbed15cb3d64a2d12cddc9e526ec9e3873a6ad1f894dd5e9b7eac283cf674b77b8e5485ff979ffad70c140829290ca092574896d91da4156b42a2b482
-
SSDEEP
12288:Z594+AcL4tBekiuKzErTOBdLjovZk46Qe6xwuAVNIE55XH259pojl:BL4tBekiuVrQnovZiBNIE5xH2bW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2932 73E8.tmp -
Executes dropped EXE 1 IoCs
pid Process 2932 73E8.tmp -
Loads dropped DLL 1 IoCs
pid Process 2900 NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2932 2900 NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe 28 PID 2900 wrote to memory of 2932 2900 NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe 28 PID 2900 wrote to memory of 2932 2900 NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe 28 PID 2900 wrote to memory of 2932 2900 NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe 0BD91B40DB24DB3A61CF13E883C19F6423851BE280347CD19A88FCD3A0A5B41CC8BA17FB3C99E7EFAB3D495C9433C95ADCFA8E7551FA40ACB960D2E7AAD9F5622⤵
- Deletes itself
- Executes dropped EXE
PID:2932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD54f5d657dd576aab546779ce66c49553d
SHA1764b80d0ea04efeadcecc5b7d3289bd257811104
SHA256ac5a86a9e090ab84130055ad1b7a0f2c635a574bfbe5498dd06b3f647dd65e87
SHA5124b003b102d707c0b4d6225df734f8895aa49cfcafdea50399200698c72f992ae719d7c7d87118bf13030259eda520285c1a1d5d8385fff8a51fa8565f7e79326
-
Filesize
428KB
MD54f5d657dd576aab546779ce66c49553d
SHA1764b80d0ea04efeadcecc5b7d3289bd257811104
SHA256ac5a86a9e090ab84130055ad1b7a0f2c635a574bfbe5498dd06b3f647dd65e87
SHA5124b003b102d707c0b4d6225df734f8895aa49cfcafdea50399200698c72f992ae719d7c7d87118bf13030259eda520285c1a1d5d8385fff8a51fa8565f7e79326