Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe
-
Size
384KB
-
MD5
1a26b1c128b6ca888354509e2a353f7e
-
SHA1
dceb42ee73e3c64951acebc7cb979574cd8de2dd
-
SHA256
335990b2b6a9fb7832f9464c12417fd1346b05a524322561455c270ef4914768
-
SHA512
eec8cd2a5a82844ed549399b6e65153d962b3032679096f42dfc781f12c1cbe4c2214946652c76a6caa6a9039efb55423f23d5a38a774aa9f7b5679679762e2a
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hH4HqnBOR0nIR9CIlIixxrBNUD0oPDgvRWQP+7KPY:Zm48gODxbzcqW0nIR9CI7xdkDDDgZm7N
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2024 3830.tmp -
Executes dropped EXE 1 IoCs
pid Process 2024 3830.tmp -
Loads dropped DLL 1 IoCs
pid Process 2300 2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2024 2300 2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe 28 PID 2300 wrote to memory of 2024 2300 2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe 28 PID 2300 wrote to memory of 2024 2300 2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe 28 PID 2300 wrote to memory of 2024 2300 2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3830.tmp"C:\Users\Admin\AppData\Local\Temp\3830.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe 4296ED602907FB71873A01B159CA35F096E7576831CAEA053401272C8A60BE4835E3A41A7959DCFE46E2A51D8C0BA735964971A28F37064D79D608B3FB8E43852⤵
- Deletes itself
- Executes dropped EXE
PID:2024
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5115707b884a4aad72ddeda184f2859c4
SHA1790311e7c2c909065afeade76cf094d635bce5b2
SHA2567af592fcf5a1cdc5367d5a0d66cf8797dbfeac255718b65911274eb5131183e9
SHA5127fe4fa85763fbaa30fb712b41c0610c9237a2fbd24ae0b4cafc434c1e2413abba1d031ab5b7856348307d80e064012a5bcec198d66c3c1ea196c0f5cf27b020a