Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe
-
Size
412KB
-
MD5
9f592438791a1f06c1ded0401ce85e02
-
SHA1
ea16dec138f942c96fc6690c22c01d29e741783e
-
SHA256
b5a763dbad20c890687b73a2480246e89e261031502c2144d1c003b9165820c7
-
SHA512
60620baf4c4b615c9a8af458973774858904910891beb6ea1b69628c4d7b779c49336f9a469617ef02bbf5b1aa3c732940f6e84fc2f9a8a045c65f5bab295365
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnAMH4I7mLVGdwL/7vnwEHYc1iJP8782nIS5dnBP:U6PCrIc9kph5TwVUwlmPB2nIqdh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 280 43B4.tmp -
Executes dropped EXE 1 IoCs
pid Process 280 43B4.tmp -
Loads dropped DLL 1 IoCs
pid Process 2940 2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 280 2940 2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 28 PID 2940 wrote to memory of 280 2940 2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 28 PID 2940 wrote to memory of 280 2940 2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 28 PID 2940 wrote to memory of 280 2940 2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\43B4.tmp"C:\Users\Admin\AppData\Local\Temp\43B4.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 170CA234A0B99F2D5DB9FFC3443ED3295CCBEF5C5878CC9BFBDAD6DF7A79F9F3BE056F1940229E21D41FDD3CD55F7548CB7B7889CFA541FAAFD93A3DDF6A31282⤵
- Deletes itself
- Executes dropped EXE
PID:280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5accd658ebcd55e512c3280bfe5e09f4a
SHA13947e4631b7a181bab65af33b10f2bc3155bc2b2
SHA256a7384339d8fe721a294a10ba4b61e3c38d10168e24ebd96b52b65b80fd3e03f5
SHA5127422247154c1336c6c28fd79838bda86a638640df7c8547ebdc63d73a39dde20e1df763a1998868cdf1ed3d6b6b6920ac74ceb179899f5e893057810a5feb2af