Analysis
-
max time kernel
129s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-17_6e8d877b619844b554c85d89f9b9644d_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-17_6e8d877b619844b554c85d89f9b9644d_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-17_6e8d877b619844b554c85d89f9b9644d_mafia.exe
-
Size
2.9MB
-
MD5
6e8d877b619844b554c85d89f9b9644d
-
SHA1
40dd2942693491db4e89078bd7b5a619abc0fed1
-
SHA256
d2bf56ae8d9549bee54ad03a2490bdb0eabe5cd672b07dbbcfddae17242a862e
-
SHA512
ae0c245bb104abfc6f235732ca3a7ad28db2ff03530ed249a3da3142b267c5060fb88a225ad5f5261f4070e467de05ee00f1bc76c8c7c4e80f67a36ae87b9331
-
SSDEEP
49152:fWnAteSAYvPsqD2AQLRgcTPC4YEeZB92k0Z/6b9HC8ds1mqklFC76g4WRA0Dayz:7teSAYvPt2AQRTPCKez970Z/6b9HC8dr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2536 Lfnhnlr.exe 2596 Lfnhnlr.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Lfnhnlr.exe 2024-05-17_6e8d877b619844b554c85d89f9b9644d_mafia.exe File opened for modification C:\Program Files (x86)\Lfnhnlr.exe 2024-05-17_6e8d877b619844b554c85d89f9b9644d_mafia.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2340 2024-05-17_6e8d877b619844b554c85d89f9b9644d_mafia.exe 2536 Lfnhnlr.exe 2596 Lfnhnlr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2596 2536 Lfnhnlr.exe 29 PID 2536 wrote to memory of 2596 2536 Lfnhnlr.exe 29 PID 2536 wrote to memory of 2596 2536 Lfnhnlr.exe 29 PID 2536 wrote to memory of 2596 2536 Lfnhnlr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-17_6e8d877b619844b554c85d89f9b9644d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-17_6e8d877b619844b554c85d89f9b9644d_mafia.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2340
-
C:\Program Files (x86)\Lfnhnlr.exe"C:\Program Files (x86)\Lfnhnlr.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Lfnhnlr.exe"C:\Program Files (x86)\Lfnhnlr.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD56e8d877b619844b554c85d89f9b9644d
SHA140dd2942693491db4e89078bd7b5a619abc0fed1
SHA256d2bf56ae8d9549bee54ad03a2490bdb0eabe5cd672b07dbbcfddae17242a862e
SHA512ae0c245bb104abfc6f235732ca3a7ad28db2ff03530ed249a3da3142b267c5060fb88a225ad5f5261f4070e467de05ee00f1bc76c8c7c4e80f67a36ae87b9331
-
Filesize
8B
MD571d864b6b132a9235400af39917131b3
SHA1b79d02acde8be0d57bedef9bd3edeab0a5a066f3
SHA256f4392ea35b8bafc5813b48055be473c4eceb72f11936a67a92cd9086efc2492e
SHA512f331a1c933e016667682d3339784e57f4518305954a7e02643b4deab5ff8ded663232f38190d535457f4351d506f642cea961ea09dc3182c7917f8e483dbd0d3