Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe
-
Size
428KB
-
MD5
c98e24a84a897a6a1ba0cec5078cee45
-
SHA1
a56283ef7a2632bb6713c4c10d052058b9cc5c2b
-
SHA256
fdf1ca5a35ea2d55d1ad3cfd73f0a33dd1c26e1c0c5e9ef5f71187cf07e30079
-
SHA512
fa2b5028066c81049bec84078ac18a55df5f233d01206513f52930a7ae790594c7e2f1f666fe0e3f80a7e43cc48c511254a40be11650ffc7c2c7f067479a6cf0
-
SSDEEP
12288:Z594+AcL4tBekiuKzErorooIAREbt/bMSIRbKqEygXp7eMXil:BL4tBekiuVrE1IlYpKqEygXpSIi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1080 57D0.tmp -
Executes dropped EXE 1 IoCs
pid Process 1080 57D0.tmp -
Loads dropped DLL 1 IoCs
pid Process 2044 2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1080 2044 2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe 28 PID 2044 wrote to memory of 1080 2044 2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe 28 PID 2044 wrote to memory of 1080 2044 2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe 28 PID 2044 wrote to memory of 1080 2044 2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\57D0.tmp"C:\Users\Admin\AppData\Local\Temp\57D0.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe 4421E91A42F345E6A5369D0EA17E7288EAC051B4E813BB23C54922DE15841BF2F94DD8838CDE3C203F07131200C5DC8921A34EA17E867D5748B28252BB3BDB302⤵
- Deletes itself
- Executes dropped EXE
PID:1080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5606c89f64c714db617e782a7119dc9b3
SHA1ef975838ebd3b0458ed86d8112efc6f4d576ad8d
SHA2566d754735c4b05e6fa79c7054de84cf10f609532900f9c27a1ef04edd6880d4c2
SHA512590847b3e7c383afb5cbd737783ba2224a9a4e21a07fe06b0c16e31659f78a8dfa6eae447641372823bcec823a1a0943b39b358f9154094b13c6ec28142bde2a