Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe
-
Size
486KB
-
MD5
4dbc7da0ca4ac4904707ff393cac6708
-
SHA1
556aa6f89e0e7c104c55e520bf2a5ecddd3abbc7
-
SHA256
99076157f9b530f476d462400cd28589f55bc956fbe531d8555d6195e43837c3
-
SHA512
2558c7fc38b10bc6f93b225acbf479bc63b1f34f2fcd4e74734c38847c94abb82d5799b267dabc02e458b1824a065b821063142269f1e32d17b924f96ab35d05
-
SSDEEP
12288:3O4rfItL8HPZmNuB4hzqVKgJX4Qd/b1dN+Z7rKxUYXhW:3O4rQtGPZYoVKgWO/b1dM3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 33FC.tmp -
Executes dropped EXE 1 IoCs
pid Process 3044 33FC.tmp -
Loads dropped DLL 1 IoCs
pid Process 1652 2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 3044 1652 2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe 28 PID 1652 wrote to memory of 3044 1652 2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe 28 PID 1652 wrote to memory of 3044 1652 2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe 28 PID 1652 wrote to memory of 3044 1652 2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\33FC.tmp"C:\Users\Admin\AppData\Local\Temp\33FC.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-06_4dbc7da0ca4ac4904707ff393cac6708_mafia.exe E5ACDCCA776B82FD5C8C3E5CD869D869C339CD9B7EC323EF29773C321C0F628F381667D311F85BE0E23C5A8CD1672BFDEF80F2C67EEF9AC763F66B9D1B4E83162⤵
- Deletes itself
- Executes dropped EXE
PID:3044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5df2c701d227af30393b3c487ae99ea3d
SHA12682b5f33a27b79682e1d2baded2ea455b6e217e
SHA256421d206435e449ef6a8d19959eec3a980a02a194d47fc35d4ae7bd646b1c3f8e
SHA512776070d0f42fd4462362197d87ef37f5ed11477836c366e0d0970ee5e5ac02e198ab12c6b82e3e009a15e87fbadfce096e80c33fc003a54294c2f46b07596265