Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe
-
Size
476KB
-
MD5
d70aa4be1034537f6b2a7fe0414d9c63
-
SHA1
6aa1797675e59a6926aa2dc04bcd20fb85174183
-
SHA256
a678926bd0d5741760394f911b7d9073bc859d5caf0ede01c79b5ae7ff39beda
-
SHA512
323104c3bba0597283503f70bb07f8def994f9e34fd2d1442361c988185ad6049be816bca4030ed4b071de1270d71f2545fb02c19fd88961a5c0e4c8942f9c39
-
SSDEEP
12288:aO4rfItL8HRXPAO9PG+RhRpMk5NLAgqergk7K9wlsDpVFd:aO4rQtGRXY6Pr5Nnrgk+9wlsDpVFd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 3A71.tmp -
Executes dropped EXE 1 IoCs
pid Process 2176 3A71.tmp -
Loads dropped DLL 1 IoCs
pid Process 1632 2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2176 1632 2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe 28 PID 1632 wrote to memory of 2176 1632 2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe 28 PID 1632 wrote to memory of 2176 1632 2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe 28 PID 1632 wrote to memory of 2176 1632 2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3A71.tmp"C:\Users\Admin\AppData\Local\Temp\3A71.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-23_d70aa4be1034537f6b2a7fe0414d9c63_mafia.exe 9BEE9BBA07105868A047E3A914A01B588F39B55E3AC8C2BDAF7FC28AA7B953B5DE79727611005C46013DA7EACAE27387FBE24948D698C4953D9A2EABABD1E6922⤵
- Deletes itself
- Executes dropped EXE
PID:2176
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD56a6306ff364c43fa2b6503eb909ad30c
SHA1b6586dc55c1367ef0e9b1a0c1ca89bd3536c9dc2
SHA256061a115a33096f1bb2b6d99b035b1076174a30209fee1eebfe233d7eb36adff3
SHA5125b49f06ce4948ed050b8ed24394010506aa5794746830e42792b79b728c531b218576c71a29284aa0247a8da34e4776b80b5f599d0bc2aa2ef9f3cd45f6dc646