Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe
-
Size
444KB
-
MD5
e01445aabdc0ecec6c2e299ada524ec5
-
SHA1
6f12af8074804e05204cffc0d52fb1d9aef0cc68
-
SHA256
f11ca86e8dcba8ae3884ba52bbbd331b8f917283b8aa1aaa89ba577a6c1e2cad
-
SHA512
deb549ab9d4d48f4f1dac9e82060ec09e82536245141755ad1d8666f95cc7fcaf6e10c32410aebe77644f54f78b5c56baf64bc728c0bc112bd33fcbd8f78bfb1
-
SSDEEP
6144:fFrJxvldL4c5ONK1xgWbd1s79+iStqw7FZEwo98ZCvQJBax5hOds+BtT5B1cYt1d:Nb4bZudi79L4FZujcoKb1B1Bt1MZ42A
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 7658.tmp -
Executes dropped EXE 1 IoCs
pid Process 3008 7658.tmp -
Loads dropped DLL 1 IoCs
pid Process 2744 2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 3008 2744 2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe 28 PID 2744 wrote to memory of 3008 2744 2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe 28 PID 2744 wrote to memory of 3008 2744 2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe 28 PID 2744 wrote to memory of 3008 2744 2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\7658.tmp"C:\Users\Admin\AppData\Local\Temp\7658.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe 646F027E89981FDB7DFF86DF31E9066882A819F4EA1BB1CC7661FB7EFE31A3C81ECDB20CBA6D2F3296C2DF0EC810A35488ECA67E8F8DF9DF2D924682E118419B2⤵
- Deletes itself
- Executes dropped EXE
PID:3008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD59f959adf71a0fb5a146e024f4f0ab4e5
SHA196ecdaa07f965da566c62dc8ef450c2a20b658a9
SHA256e185219ebafa70b4ccdf80c8515c401121118b5dab52b269c33e33e1399a29ce
SHA5120ace13552b93946c722d87bf4983edf7d05df29b3d88c9541dc922017109d077e892809bb337822ec0d038c04ab1cdc4eb994804a8ab6822acfee1f55477cdd0