Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe
-
Size
443KB
-
MD5
bd0a5fb1e9524977f1933429a30b2707
-
SHA1
69b5fbdbf8709d72cb6dc86b7a98dfd92798441e
-
SHA256
ca75e6849c2894a3d8e587e11dedf1a9c491966e946e5dfa718f42cd2871bb92
-
SHA512
af7b5e546df1dfeba549ca45c2b9c4af1e62bb64a23d3144fcb462137efda6d85c5f85267bd5fde617c30b007ce8a1efb96cb513c94c092192a56391a57d6f04
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYk8SbN71KJB1jCstGYO2s93t2Vf84EAfFHGvlMa:Wq4w/ekieZgU6DR+BvA289GjEoFclMa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2204 4318.tmp -
Executes dropped EXE 1 IoCs
pid Process 2204 4318.tmp -
Loads dropped DLL 1 IoCs
pid Process 2060 2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2204 2060 2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe 28 PID 2060 wrote to memory of 2204 2060 2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe 28 PID 2060 wrote to memory of 2204 2060 2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe 28 PID 2060 wrote to memory of 2204 2060 2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\4318.tmp"C:\Users\Admin\AppData\Local\Temp\4318.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-28_bd0a5fb1e9524977f1933429a30b2707_mafia.exe 0E4A4946128081E048CE12F30A5264D769B41E8493AAD2EE9B9E2C785BB8531B51D124C345BC113B8EBFF117BCCD9FDDE2443B271BEB2F918CB5F9A1D327D39E2⤵
- Deletes itself
- Executes dropped EXE
PID:2204
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c17aab0a96f6b0d6436d6a09e5818e2b
SHA10a781d33fd0140295567e68185c4b90a1db62c46
SHA2566dcdb85eb8075f95f71307036af3e948f8bbecf0a6681e599f368185da3a5eda
SHA512486d597c166e969684bea733efe43afe8d0bc6c5ed3ccae8bea775c21e4aa97a675013b435087d8d0e55668dfbfe20dee6eba64c0a9ff233b4b21a69685fe202
-
Filesize
256KB
MD53256cfc92ab1447ae760e6a91df035a1
SHA154d9ba76b8835550523c48a6ca26edc1b20e69dc
SHA2566d19acc723f448948423c97faa7c4d80f468e0441ba0d7c2710fedb7b5771b3a
SHA512b387123cba2a317e261dae02b78ec61c5671ef78c3db48ad01fb5f312f459c53786073404104d4fb0368d45f27220100443f4e538485dabe32903b375d89fbab