Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe
-
Size
444KB
-
MD5
8b6a8d7cfc202e366a63a0e312767a32
-
SHA1
9b8fa078d6b84aeff0111701ce1f5f0d1a7edc46
-
SHA256
6bc3da973d36893135c9a33b5eb3c3df188aef7a8435a8680d3bfbd5b7addd21
-
SHA512
c6a86096903e4afa647a25a0c7091b135e699db8213ab0a44b8b703c31aaa3787264396c9f4575f5284a516d31d12d073c464c39fdc79fab74846462247dce36
-
SSDEEP
12288:Nb4bZudi79L0QNCKlWp7zcr4qFprQkjd0BA:Nb4bcdkLZlunc8qFlfjd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1660 5541.tmp -
Executes dropped EXE 1 IoCs
pid Process 1660 5541.tmp -
Loads dropped DLL 1 IoCs
pid Process 2408 NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1660 2408 NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe 28 PID 2408 wrote to memory of 1660 2408 NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe 28 PID 2408 wrote to memory of 1660 2408 NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe 28 PID 2408 wrote to memory of 1660 2408 NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\5541.tmp"C:\Users\Admin\AppData\Local\Temp\5541.tmp" --helpC:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_8b6a8d7cfc202e366a63a0e312767a32_mafia_JC.exe FFAE39989A5635CEDE446B75535028682267E27C1B23DCEB20F664E4FFD8458A5381C27EBB27B10BE146C06E48BDF276FDFE7F31EB094DDFF022945DFE638AEC2⤵
- Deletes itself
- Executes dropped EXE
PID:1660
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD5a0e9051d2bf3aee8ba33be1e8eed457b
SHA193b3437a28def347481248683a9bbe1ef2e5b5c3
SHA256047832d80fc8ceac54f29e6a34f51c85f04a71bfbc6ad3fd32081090bbeb0cd9
SHA5121babebe779d3e40e3dc959631892059586fe7f7bce35ed9f9f9b646848179c7fa36e1e725120ee21ae3d6ee2736c7cd3c3fc38c4b86d775536332869e2099009
-
Filesize
444KB
MD5a0e9051d2bf3aee8ba33be1e8eed457b
SHA193b3437a28def347481248683a9bbe1ef2e5b5c3
SHA256047832d80fc8ceac54f29e6a34f51c85f04a71bfbc6ad3fd32081090bbeb0cd9
SHA5121babebe779d3e40e3dc959631892059586fe7f7bce35ed9f9f9b646848179c7fa36e1e725120ee21ae3d6ee2736c7cd3c3fc38c4b86d775536332869e2099009