Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe
-
Size
435KB
-
MD5
ee704322f589481888f239cd10bef34a
-
SHA1
4fd91f44892203b100d2b0dad400dc6be2e8e761
-
SHA256
2ecd05b8597b99b4048b5702c3ba11ad57e5282791d183a5daf8277fa30aad73
-
SHA512
bf21f0813beea49d235d2ccdb5e657f8bb87f2901809005eece645e1cc86b478f4db1efbfe0e69e027b0d5a66e43a06b90cdefd08ac490d576d5f1f10a53aad7
-
SSDEEP
6144:fJvyW4ojUnQjx4qePix+qXQjBYe+wQKQhX8TzLwMD3bekKJXc/sObY9z0NrXw9J:fd4x+ePixnXQjcAQp8TPekKJMUOxxwP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2644 144C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2644 144C.tmp -
Loads dropped DLL 1 IoCs
pid Process 1984 2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2644 1984 2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe 28 PID 1984 wrote to memory of 2644 1984 2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe 28 PID 1984 wrote to memory of 2644 1984 2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe 28 PID 1984 wrote to memory of 2644 1984 2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\144C.tmp"C:\Users\Admin\AppData\Local\Temp\144C.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe 3A000445B26C1EFF236F8E4005A13DEC3EB0F324542A293918A1B0144B9E639A8A6F49D6B4F1587142A6D8FB91B72BE244822C0EFBFB06D6BC164674B1B4B31F2⤵
- Deletes itself
- Executes dropped EXE
PID:2644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD568d56c10f4a1feb43dc5b314dcf3f935
SHA1f775f4feedff6e1a51983430e5f439a32f4f20dd
SHA25612bdd0a23d463a20e86a4a76bde715d0e1771cadf348194ec32faac068c199b3
SHA512d0e20266ca9f14cef293fbcf0adaad094a66bbf39437b6581934777049a645734d6b91d649245954ee8f27257ac06b34910b20e5be4d4b81db29e69da645a047