Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe
-
Size
411KB
-
MD5
7ff443280e67934d2ac5d2af333a6bc9
-
SHA1
f2283fd49b749661c8179c3fc667446b7b5e3379
-
SHA256
5e79e7b229dc32bf81de8f46eed167b73341b6d36912e759777e50c521c57411
-
SHA512
4f86f0e230621a0ff9f89a3bfe68c32f8661169568362c55c9f3e9534e69378be11e566b9dcd112cf5d983444ac206807337942b3c435e991d1341472d03391b
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFojFmwKL0eMpOTxSLH4frbjc7IqHI:gZLolhNVyEI5JMk1SMc7IqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2100 D69.tmp -
Executes dropped EXE 1 IoCs
pid Process 2100 D69.tmp -
Loads dropped DLL 1 IoCs
pid Process 3068 2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2100 3068 2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe 28 PID 3068 wrote to memory of 2100 3068 2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe 28 PID 3068 wrote to memory of 2100 3068 2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe 28 PID 3068 wrote to memory of 2100 3068 2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-15_7ff443280e67934d2ac5d2af333a6bc9_mafia.exe AE919599425F2FCBE1B2C6C28EAA6617F15B77406B0286CB265219B985727D838FC03C3977E1A2B6F5C2D0250A967E6C8A75DA27D34ADF1B28AE5D042DFA734B2⤵
- Deletes itself
- Executes dropped EXE
PID:2100
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5f4dfbe9e6990a77454401525feaa17dd
SHA13f7d6a53b1d7b1fac3c7dff3050649df91abaad3
SHA25671798b9db187f8b29bd2ed2a80d7f9330d689f5a8d0a450aa2f36900690560c0
SHA512ea6a487439a5bbf2fafe6b97c3e3da30ca649eba2ebed64f3cccde1134560b18a9472078c6ff11cd0e34145aa10fd665cd9b9a5eb7574275d3527d3148809f68