Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe
-
Size
411KB
-
MD5
e2b03529c260c89502f28c07e1964c6f
-
SHA1
47c7435f28d050b5cd4e51e6d0e3099c411bb8bc
-
SHA256
4ac43389ec7a8fedfb10593819196b5b6f9a863d712715d80860282c58588c2a
-
SHA512
fcebcf42d42f5cbfbb409a1e06b28670e88b2fea56391be4d05f90ad01fb836f5efe3cf5502aba0b603fed891bf44b15909f8780a68fb861c163a02ed2d9aad2
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFEwxdWQayAct3afzXziWX0V51Ipv98KTbqHI:gZLolhNVyEjtQaOtqLXmw6Ir8KTbqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2472 17C5.tmp -
Executes dropped EXE 1 IoCs
pid Process 2472 17C5.tmp -
Loads dropped DLL 1 IoCs
pid Process 2292 2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2472 2292 2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe 28 PID 2292 wrote to memory of 2472 2292 2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe 28 PID 2292 wrote to memory of 2472 2292 2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe 28 PID 2292 wrote to memory of 2472 2292 2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\17C5.tmp"C:\Users\Admin\AppData\Local\Temp\17C5.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-24_e2b03529c260c89502f28c07e1964c6f_mafia.exe 35B6418ABB572644E0E4C6520E2F53DAC2A8FB6F6620A722C664D5EB6390EA2FBFD26FA994D85E57326767E98090FA0FE454975E18AD8F69839EF9BC9C16C0D52⤵
- Deletes itself
- Executes dropped EXE
PID:2472
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD50ff27bdd87e53f26e2d9dfe8637f8408
SHA1f48153b6bd1e40220721f669fea2e3eaf66afa2f
SHA256c53fa7871934a2b0820408e872a47ed1ac07d4b669ccbfb450334c02fdbf88f7
SHA5126a013277806156c4701806b8da826c5809390b62659b612ff4f8032716035b5450f06073ae099f23d6964a0262d6011a1bc7d53cdc527a3a1155d283f2f4a70c