Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 06:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe
-
Size
476KB
-
MD5
6dfe0d2d76ab39086d638adaf04dc94d
-
SHA1
e568a32bf60723eac481657786c7533820241db1
-
SHA256
8edd0efaf47f0b9a78279c72ec9ade59379284b47a975ee6dccf9de9ba3eaa1f
-
SHA512
29084760bf25fe39e08b5df2f5b8c7c790e0676a196828d86ed0c6d509d413b44fbd903b1ccbe3ad7b1e84fc9706a0943ae7befad3ed7d9b3e693f28106ec226
-
SSDEEP
12288:aO4rfItL8HR8c1xnX/eWYjD/eV6RIZM37K9wlsDpVFd:aO4rQtGR114djiV6RYs+9wlsDpVFd
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 213.tmp -
Executes dropped EXE 1 IoCs
pid Process 2824 213.tmp -
Loads dropped DLL 1 IoCs
pid Process 2508 2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2824 2508 2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe 16 PID 2508 wrote to memory of 2824 2508 2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe 16 PID 2508 wrote to memory of 2824 2508 2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe 16 PID 2508 wrote to memory of 2824 2508 2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\213.tmp"C:\Users\Admin\AppData\Local\Temp\213.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-11_6dfe0d2d76ab39086d638adaf04dc94d_mafia.exe B1105113426FE0A7512300817C4929BB6E13D2291F01490B34E689A62910CC9B37E9EFB82AFCE253E794CA81AEC8435B23E71AB6288D595CEC117475039FA80F2⤵
- Deletes itself
- Executes dropped EXE
PID:2824
-