Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe
-
Size
428KB
-
MD5
0277ef76bde66cbe9e82c17f7fc65b0b
-
SHA1
4768f51fec7f338ada4dbb8bafc57a8a0d7c5ffd
-
SHA256
0e5c45f70f93df07494d1e6ad56a1b587c18c1f6e136fc7678305f1d8ecd9e90
-
SHA512
57a99488850ec06dfd70ea54ca2ee674ab0e6232172d2d8f8da3ce16f20dca27301cd2979673c113a6cfb5eb4cdfaecb2a2f2bb0e9d2c4129f47402c52539fc3
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFeVefItXMETvfKroHIvo3B8Mw+af/E/XPyqHR:gZLolhNVyEjAIeUvAQR8Mw+JXyqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2128 2F5A.tmp -
Executes dropped EXE 1 IoCs
pid Process 2128 2F5A.tmp -
Loads dropped DLL 1 IoCs
pid Process 2044 2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2128 2044 2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe 28 PID 2044 wrote to memory of 2128 2044 2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe 28 PID 2044 wrote to memory of 2128 2044 2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe 28 PID 2044 wrote to memory of 2128 2044 2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\2F5A.tmp"C:\Users\Admin\AppData\Local\Temp\2F5A.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-16_0277ef76bde66cbe9e82c17f7fc65b0b_mafia.exe F90A5D1665513DBEFCDD0FE3ED85E155C3E46F9BEB0E34F52374D9103611B58CC3CF3377AB5038331E18E4D85D5A02148A722458DF6941C7FBCE0AD3437C13102⤵
- Deletes itself
- Executes dropped EXE
PID:2128
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD50f104df86a99f48a97cb8448a503de5c
SHA1d1b045bc0f404f695ae625ca4fa6e747c1ad3e40
SHA256bc682582c2b53ef9cf1ca5237912068832e81b98a750178081602c1bf83c5819
SHA5127bb8e13e6aff690f902bab3efd8eaa017b10413d0b930752caaa76618e577a4653e912b8f1b956ae61a2fe2d219d110459a4757514d6959b51bd276c6f900728
-
Filesize
428KB
MD59969e11183192f531d67f774fa0adc29
SHA1279bd8f30f48f98b2c88c9d7c7f40cc286a641b8
SHA256d7515eb170f4776fad2499fc9b8d63fa3ac2fd8d0421dfcbe0fae103a573855e
SHA51231a963faf767671ca5031c44ef79c9e6da3f58e00f35f1268aebf0389813487fb7561dc7b87965333cec0d0c4e2f31daa348e3d012d50c4e8f0a07639ea355f8