Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 17:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe
-
Size
486KB
-
MD5
e2aa84af27b29dc9787ceeb16b3b1983
-
SHA1
bfc2a54d1e6058219c651971bb68eee0bb59ba60
-
SHA256
cbc8dc23b5b1cf72a70989d5e4337967b9a825eb66104a3d208a815158ba8865
-
SHA512
aaa0ccb02509351e95c208fe77460f643fddd38b593836e4bfeae15cfa481d945b8aa45923d7c997e395da432f375fca71ae7359a02d5beaca4e730526a5a86c
-
SSDEEP
12288:3O4rfItL8HPmcBrhRtTDG1iAiPHCorluD7rKxUYXhW:3O4rQtGPmEtTmiHHCoAD3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
A5D.tmppid process 2440 A5D.tmp -
Executes dropped EXE 1 IoCs
Processes:
A5D.tmppid process 2440 A5D.tmp -
Loads dropped DLL 1 IoCs
Processes:
2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exepid process 2128 2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exedescription pid process target process PID 2128 wrote to memory of 2440 2128 2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe A5D.tmp PID 2128 wrote to memory of 2440 2128 2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe A5D.tmp PID 2128 wrote to memory of 2440 2128 2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe A5D.tmp PID 2128 wrote to memory of 2440 2128 2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe A5D.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\A5D.tmp"C:\Users\Admin\AppData\Local\Temp\A5D.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe 016E321FAEE89E58F4446DD0D903603F34EA244C38A0AE69A750D501FB3EFC587082EBA6520A513FD51FC8432EF2B1367CA28F7E725A730DD67F75959609913B2⤵
- Deletes itself
- Executes dropped EXE
PID:2440
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5ce56c9c82b715a239a942c2fc5111c3a
SHA12b7ba3d7f2a3001d99f43c34a89b0d89d3a53456
SHA25689f9c39b254f75bd8d533287771eb35d6394b5b6442e078b51aa9805af9e6b96
SHA512daf22efb6af4bc136dd87de024ecfeed4a27abce12b300196209b02b3346ad65553d96b437f45a9ca62a6c6acbd0ecf4708a793d39380fc57d28c11158ebdade