Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe
-
Size
412KB
-
MD5
f8206898c9fe19d83dc14f4ba22508da
-
SHA1
eb07c46c5b44bcab484f5ff9698b20762d79a283
-
SHA256
733e65563081fcb7a77b32efc138b934f7f782778aa034306c85b50bd0320d68
-
SHA512
09510d62803ac8575f5e6b7e824fa977a6988ec4d1e721d7c1b70f156290e9214cf5ede9d981ee14924028c4d29b42cabcc77d018c565c728fc62494249e476d
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnBSiq3JOpgwu8dKQkMZGFp/3YFzUixFRP:U6PCrIc9kph5CkpJu8d0HFpwFzdHx
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
4A2.tmppid process 1228 4A2.tmp -
Executes dropped EXE 1 IoCs
Processes:
4A2.tmppid process 1228 4A2.tmp -
Loads dropped DLL 1 IoCs
Processes:
2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exepid process 1764 2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exedescription pid process target process PID 1764 wrote to memory of 1228 1764 2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe 4A2.tmp PID 1764 wrote to memory of 1228 1764 2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe 4A2.tmp PID 1764 wrote to memory of 1228 1764 2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe 4A2.tmp PID 1764 wrote to memory of 1228 1764 2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe 4A2.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\4A2.tmp"C:\Users\Admin\AppData\Local\Temp\4A2.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe 004611C7718409307467DBB81531CC9985592C02C9189680592758E2807FF4981C9243B61C769C4F07D08AFFB4519FB3732A7047D35B100548D029DA9693CD822⤵
- Deletes itself
- Executes dropped EXE
PID:1228
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD58a5ab64c922a03ee46759127457a20ee
SHA118c76797c895ff1672c3f0fe05daeaa63f3d8cee
SHA2568a2c41f000927abd7dcda57501131bf80e7a94b94404ed4cfd90fb6338fc77ad
SHA51257068641287d2fe6812518d1194f1e808781f256a9972e5dbd450f7b6c5f95dc8c5028673670072d0a3072819d9fbe61336255ac877fd39ac4fa63dfa4dd973a