Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe
-
Size
411KB
-
MD5
5a128c44ad92f3a47ec3475b3b9c4895
-
SHA1
c9b2fd5f5dc805759e7f6404ac67a1ac7bb96fc1
-
SHA256
258943cdb400f1723c64056b6bf6015315b7a480f7773c8c0b935e7471062d2c
-
SHA512
1b825fc637afee51498a3309b695fecf56368f54e9fcbd28ef0be9f828eb5716f384df3e0dfabe82c2966daead525ebb93486d1970ad787be60ebd9419a4a7fd
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mF1zX2seSBxmtqd63SwsbNfUK2xqHI:gZLolhNVyEkzX2+xwVsbNfr2xqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2632 667.tmp -
Executes dropped EXE 1 IoCs
pid Process 2632 667.tmp -
Loads dropped DLL 1 IoCs
pid Process 2932 2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2632 2932 2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe 28 PID 2932 wrote to memory of 2632 2932 2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe 28 PID 2932 wrote to memory of 2632 2932 2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe 28 PID 2932 wrote to memory of 2632 2932 2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\667.tmp"C:\Users\Admin\AppData\Local\Temp\667.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-07_5a128c44ad92f3a47ec3475b3b9c4895_mafia.exe 820C23BE600B450DBCB7135F2D511F2ECD86EE4B31F4F8168BA9D84579E80DC354DF8B4C1CDBB1885E8EFD6FBB08425B1415E0F925762664BFEE14FD67D39CF52⤵
- Deletes itself
- Executes dropped EXE
PID:2632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5d60714be8e15e3da358214936a901374
SHA1149741e97a2acbd9c9d17324bc65ca444f748005
SHA256ba94284cc07475804483c73e32f2cc33687238d7396aeabe3d5786c53e5c60c2
SHA512935eac81fcc51234df12f72355b57661709190109aea65bd64549f082cd57cded3f6509938a7361563f17b3ae3c7b339a1125c818bb8dc46478fd5d154d3a419