Analysis

  • max time kernel
    13s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22-10-2023 06:47

General

  • Target

    NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe

  • Size

    428KB

  • MD5

    0322959d7a4d271cd4d73ea4e8aa794b

  • SHA1

    71f5358747f3b29cf343e0cbd86232d91d154774

  • SHA256

    57676d8a2ae5a8bb8e178871c7701e99b69d0714865cf62a0f1f2537cd795164

  • SHA512

    a12dbeddbed15cb3d64a2d12cddc9e526ec9e3873a6ad1f894dd5e9b7eac283cf674b77b8e5485ff979ffad70c140829290ca092574896d91da4156b42a2b482

  • SSDEEP

    12288:Z594+AcL4tBekiuKzErTOBdLjovZk46Qe6xwuAVNIE55XH259pojl:BL4tBekiuVrQnovZiBNIE5xH2bW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\73E8.tmp
      "C:\Users\Admin\AppData\Local\Temp\73E8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_0322959d7a4d271cd4d73ea4e8aa794b_mafia_JC.exe 0BD91B40DB24DB3A61CF13E883C19F6423851BE280347CD19A88FCD3A0A5B41CC8BA17FB3C99E7EFAB3D495C9433C95ADCFA8E7551FA40ACB960D2E7AAD9F562
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\73E8.tmp

    Filesize

    428KB

    MD5

    4f5d657dd576aab546779ce66c49553d

    SHA1

    764b80d0ea04efeadcecc5b7d3289bd257811104

    SHA256

    ac5a86a9e090ab84130055ad1b7a0f2c635a574bfbe5498dd06b3f647dd65e87

    SHA512

    4b003b102d707c0b4d6225df734f8895aa49cfcafdea50399200698c72f992ae719d7c7d87118bf13030259eda520285c1a1d5d8385fff8a51fa8565f7e79326

  • \Users\Admin\AppData\Local\Temp\73E8.tmp

    Filesize

    428KB

    MD5

    4f5d657dd576aab546779ce66c49553d

    SHA1

    764b80d0ea04efeadcecc5b7d3289bd257811104

    SHA256

    ac5a86a9e090ab84130055ad1b7a0f2c635a574bfbe5498dd06b3f647dd65e87

    SHA512

    4b003b102d707c0b4d6225df734f8895aa49cfcafdea50399200698c72f992ae719d7c7d87118bf13030259eda520285c1a1d5d8385fff8a51fa8565f7e79326