Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe
-
Size
428KB
-
MD5
a5db5cd7e40d862cf5c16bfc941c4714
-
SHA1
4a49b7c569d1e30033f3fc40543aabf6558c0659
-
SHA256
63a6b97ae89632ff16753d2361b4e23058bfcc440e45fb331295297d18dd8b4f
-
SHA512
e726462f3c081c21fdbfa0967272f2a17b708c0f9cabb2b8334473aee0ed2a60c789828a544065736cdbb2b3d2430d4397293af0339097054c82ac88995c13e2
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFWHAhHNPwDFycorEs3iPSdFooEPjUlHCjsqHR:gZLolhNVyEdgLQEFEsCqOUnqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 428C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2860 428C.tmp -
Loads dropped DLL 1 IoCs
pid Process 2212 2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2860 2212 2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe 28 PID 2212 wrote to memory of 2860 2212 2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe 28 PID 2212 wrote to memory of 2860 2212 2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe 28 PID 2212 wrote to memory of 2860 2212 2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\428C.tmp"C:\Users\Admin\AppData\Local\Temp\428C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-08_a5db5cd7e40d862cf5c16bfc941c4714_mafia.exe 39CBC491C5CD61E7303FE0E609A376683C8DB22DE84D908527DB25E425177BE3EC07B534B6752A1F150DAF7CE832B909BFCE0860634178D5F71CEEE2B439C1AF2⤵
- Deletes itself
- Executes dropped EXE
PID:2860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59195d30e27f376145e5586a62fbde472
SHA149479556daa4c969ad5b04f4d304c34fcca3406c
SHA2568300ccaf6fd09dadfd421d8312041fc668b292bd9c44d0c0feb081ed4946fab7
SHA51275b4b14134bf5057ea4663471a18ba8b31293166a0173e0a2a4bc1e364ef07bbd9418fe4aee511fd4335968bf1600d3fad1d70c54c5b98b0cdf164eb7bb56841
-
Filesize
91KB
MD55fd4a633e5b094bc84984fa5b033268f
SHA10b6ddb1a402fa9f9f751985a9eb631d7e0383c76
SHA256b62e4f6364bd26c143167850a2682460eb36db0263bbdcd600be749520e6c3d3
SHA5123bbde394ce454d3ca2c6fdbb8bc52a7733883c8d00d5cd4bad1849efde988ef6bebe20710117dc8e85284724b88230e7ac6a80557eed2df830f0c488c1c04db9