Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe
-
Size
428KB
-
MD5
7fb42ed6bcb3f407347e0409ce476b99
-
SHA1
d1d2bddae38ed9cf4789ebaa0e4143c3d70faa99
-
SHA256
fb82fef11f8fc22ef7106e40b698481294bcc04f1a55d861139d87702ee9841d
-
SHA512
d548a689731c33df37a52fad585176b0a7d365bcbde2883a91eb8cea92af1d81dfba4f8707deb3061f4da18dcb2d46bb990ac6e023213df1547b6aadad4f39fc
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mF1IPq/rkKFbB2IMZ9neokf+j2idOQXx3PmQo8cwcO:gZLolhNVyEHPafxcHymXx3PrcNTqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2588 144C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2588 144C.tmp -
Loads dropped DLL 1 IoCs
pid Process 1712 2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2588 1712 2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe 28 PID 1712 wrote to memory of 2588 1712 2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe 28 PID 1712 wrote to memory of 2588 1712 2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe 28 PID 1712 wrote to memory of 2588 1712 2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\144C.tmp"C:\Users\Admin\AppData\Local\Temp\144C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe 119941EDDDB80775D4F858009C94114F87935A3D6278758BB36A2315C0ED8E1A694E0D59194AD6F136F565F76BAD78D050D745EC68699EB0FD6F78F1213240D52⤵
- Deletes itself
- Executes dropped EXE
PID:2588
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD54123690bbc789ca67307a07cf98b3c1a
SHA14ec81ef7184e8e5219d299cde7c0fb5ea22e625d
SHA25623aeb4d70f3066446d6eb53c4779345202d36f749f0f245949cea58723a83925
SHA512c1a74ed1b380325f08d25a5f17203e4062236beecfe23324403a126d0697e73f1584d05a435e22698fe0951234bdcae8ff159e5c3e8c551af7f9628183fd43c3