Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe
-
Size
414KB
-
MD5
9fb0e418a391917e0b7c08834a1acebb
-
SHA1
b9a6fd17ba271d71c49dea05a147b419a3cbc52b
-
SHA256
d58dff7716ac53dd29eac6bb009c5f953d5864d230072e395b577dc71ca409c5
-
SHA512
8a635e30574479cf9d578ebd66af84ffff32cc1563368e1186b28d817b4e728ddab6e2b094b0168f9c22a52e92fa603152e83e8a00c1c6ece5491d0b747d9cd2
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYxDTkdULeZunY13/HXT+BKJ3tAH7lx:Wq4w/ekieZgU6uTLe4nY1fjH5tAblx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2104 1056.tmp -
Executes dropped EXE 1 IoCs
pid Process 2104 1056.tmp -
Loads dropped DLL 1 IoCs
pid Process 1728 2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2104 1728 2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe 16 PID 1728 wrote to memory of 2104 1728 2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe 16 PID 1728 wrote to memory of 2104 1728 2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe 16 PID 1728 wrote to memory of 2104 1728 2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\1056.tmp"C:\Users\Admin\AppData\Local\Temp\1056.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-08_9fb0e418a391917e0b7c08834a1acebb_mafia.exe E573FD5B9993C27EA17ED08AD20C81D41E6228A3A61253A423A581B66C0FDAD9CBE73720016AEAD875671D0EA2F3AAC7BA39D7A2F779ADE3FDE39E5BF686E0262⤵
- Deletes itself
- Executes dropped EXE
PID:2104
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD51e3fec54953e918e9d926321c56e5797
SHA1eb2cd6ff9db2cd0b7e936518e9eeab609f4dccfc
SHA25679bb70b79b54647b5371e76457d354afa7b07141f8849fbca49d10866b306d19
SHA5120447259c1ecbc7720a9f45c39332f7cbdea238de4976fb13c4cda1019b09c309c0cac2d06599821ee8475359a2669d9dbf1ab10266e325e22bcbb447ea764fc7
-
Filesize
249KB
MD5c3a29e05bb41dd739abe71f140bc568b
SHA11ebd9a0cd0fedde4ea08cf5d3c760ae26109791b
SHA256e511c54763d5e56aff21adde69b6b603d39d1c5537bb9bbdf00257ed7958bb6d
SHA51286946aba16a382821bd00ddde7869e074f9eb81b5fefbad48ebcd1cc32623de76de38ed96715446e69c1ecebf56508883cb663a90d6ea2a03deab881b5f5a538