Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe
-
Size
411KB
-
MD5
22cc3bf2f1579af206be86bab18ad13f
-
SHA1
ad067fa3bc50ae18bbe35d7161fb3b3a7e782564
-
SHA256
1f7e8dc007ec3d3a68e0f0e54c24fa51f2028933935b6cbe56d6904202a95885
-
SHA512
56bcd7a428fb217f3c11be6ed88b271a38a8d31b3859ac3f8fd3d202df0c7116246af6761133c808fcd77ed1335390a021f4f0f77b6d8dcd83fffdcdd8cb8198
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFavZgZsafAbcCzZkyXPflvKwGknnNiPjqHI:gZLolhNVyE8eKGJlnGkNQjqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1720 5AAE.tmp -
Executes dropped EXE 1 IoCs
pid Process 1720 5AAE.tmp -
Loads dropped DLL 1 IoCs
pid Process 2148 2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1720 2148 2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe 15 PID 2148 wrote to memory of 1720 2148 2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe 15 PID 2148 wrote to memory of 1720 2148 2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe 15 PID 2148 wrote to memory of 1720 2148 2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\5AAE.tmp"C:\Users\Admin\AppData\Local\Temp\5AAE.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-01_22cc3bf2f1579af206be86bab18ad13f_mafia.exe DE61B5928EA621F5538E05301CE65EA5F6A3A63C0C55B6E8630061D7C93C359A2A75DBC9F08D68FF7BD20FF495EBA4F4F5016DCA8E97DD2FFC3B4A6AED11EE712⤵
- Deletes itself
- Executes dropped EXE
PID:1720
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD53bfa33cd3a221bb5fc511d89b0e9b188
SHA11abfbb034a683e00367d52e322e02fc49e145e0a
SHA2560b05b24f2b46f8b9796c06e60ff32138f21be7ad4b2433d453e64e9e040ea7d1
SHA5120699ec467f64d9bb4739d83e5ae87df0c9ed4cc49bb6895da82f569ea5c7a57d59323abe6eb8bd997dacd870a375dcba922cde35b241efc5815da725ec52849c
-
Filesize
36KB
MD53806a1f30abe7af3928abda1de086603
SHA174f8383b6a36a0478076ea4231008d5b00146625
SHA2562fd1110a814fae170d200974e2d86e840cd2684056dffef704db7d097b3197b2
SHA5123558224c511107464b99b58d11c29a164491ee0669ec2e0536ead6939b02bf468e56ef349ab8da9e4425568f6e7142087f609ba2c241970e5b59b0fda27eb1ec