Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe
-
Size
384KB
-
MD5
7048e64bf59ba9ea564e4cb2823e513e
-
SHA1
be060399add9a9f66164f8376e887918e6016d7c
-
SHA256
8664850ac2a22a6d382612b689bd1b9a8b9be3a1a0df99c272748690067c508b
-
SHA512
a82b47c4d13ced4f0b667ac7deecec66f7641dd4ce550a99e30b0c00a3bc611a361d91b78408c2f5d80b69e7c7e3068b616042c7c773ae65b05c8a4170e4ae7b
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hHNJG7a5pPX6r2/0E/cNZeCEMZo0On2HH3GZ:Zm48gODxbz1Cy709EMZo0hn3GZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
4837.tmppid process 1640 4837.tmp -
Executes dropped EXE 1 IoCs
Processes:
4837.tmppid process 1640 4837.tmp -
Loads dropped DLL 1 IoCs
Processes:
2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exepid process 1652 2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exedescription pid process target process PID 1652 wrote to memory of 1640 1652 2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe 4837.tmp PID 1652 wrote to memory of 1640 1652 2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe 4837.tmp PID 1652 wrote to memory of 1640 1652 2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe 4837.tmp PID 1652 wrote to memory of 1640 1652 2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe 4837.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\4837.tmp"C:\Users\Admin\AppData\Local\Temp\4837.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-12_7048e64bf59ba9ea564e4cb2823e513e_mafia.exe F740CFC3642328239273F7E078AAB1F284BA6670C1E615D1B11E6BC891A24544AD97B1D6FFF364F58C44934BB72A35633480E998411AC0CEB8A732E16176C8E12⤵
- Deletes itself
- Executes dropped EXE
PID:1640
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5219e7b8307a9e39f3f4f73c2cb794121
SHA1c554be872f6898cd3c72055b41c8593c3d82b1a4
SHA25692e44d5fa5b33ff7e856599dcb8bca9327f2498b9603a7689e4a46a61eefaf07
SHA51294059ab4d235559cfa39bc795fd7adbba8a411026ec85781ad90863e813ec6fcc5862265ca578097a70fcab60c9b06324f0e862402921cbb5d5d2ed03d7d6db4