Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe
-
Size
414KB
-
MD5
77a78f8673a5a45244c62dc5391e7000
-
SHA1
5dd4613202f8a0928d58b897b015cb3cbc25f3d7
-
SHA256
aeea91e489d6d5f76170aa2c025deb4e5d6c3c02262a601e6f37f77cd6f58dcf
-
SHA512
da882a34ea5082cc078a1d82b93269769279adc56b8b38bd01ba73fb14bb8e0e1d3d6b3103ce3389170e6ae62b76e8b6c779684b4843e1f908494a426ff8923e
-
SSDEEP
12288:Wq4w/ekieZgU6b+rliDsycH1UUjNC92WQplx:Wq4w/ekieH6KrlbJU2yTQpr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1704 41F0.tmp -
Executes dropped EXE 1 IoCs
pid Process 1704 41F0.tmp -
Loads dropped DLL 1 IoCs
pid Process 2516 NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1704 2516 NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe 28 PID 2516 wrote to memory of 1704 2516 NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe 28 PID 2516 wrote to memory of 1704 2516 NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe 28 PID 2516 wrote to memory of 1704 2516 NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\41F0.tmp"C:\Users\Admin\AppData\Local\Temp\41F0.tmp" --helpC:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-04_77a78f8673a5a45244c62dc5391e7000_mafia_JC.exe 7281201AF146D0CE72489ECE32ECE6FC44ECEB88FFC298E995751EEB97C620B8078349A8BA28A28386B06A1710C88E7C0BF26CF08548B6CA0467C0E83C9F08A72⤵
- Deletes itself
- Executes dropped EXE
PID:1704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD56fb3758f0b7fa156708b2d3f7c7295c4
SHA172e93df311b52e61fad61e54f0e5c46a8224061e
SHA2567f78abe495e2f30024a509d974f861bd99fd0e7a68fd113c05207b506b66a44f
SHA5128588259cbae23b9d2342a662bc3bcd1c5cab664c97d766be2b2e1d025c8e6e11dc4a24f5fea3977b8849b91d086960fc110fb3c96877572222f835ad865d9463
-
Filesize
414KB
MD56fb3758f0b7fa156708b2d3f7c7295c4
SHA172e93df311b52e61fad61e54f0e5c46a8224061e
SHA2567f78abe495e2f30024a509d974f861bd99fd0e7a68fd113c05207b506b66a44f
SHA5128588259cbae23b9d2342a662bc3bcd1c5cab664c97d766be2b2e1d025c8e6e11dc4a24f5fea3977b8849b91d086960fc110fb3c96877572222f835ad865d9463