Analysis
-
max time kernel
138s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe
-
Size
473KB
-
MD5
0519b79d46313670367d7d3e627dbaba
-
SHA1
6852935e027abdd28670e22573b7098349463c39
-
SHA256
c37ed325c06d6164b7bf3b951f88785175abc3b52f4ca7f5b71675c9e41cea3d
-
SHA512
398585760ceda793a71510bb08eec035eff670543b1e8e771e8246b5daeba5b76987549bf6abeafcbda94a4fae862061fa8e86ca171669ce27b9a53c2008ef03
-
SSDEEP
6144:fFrJxvldL4c5ONK1xgWbd1s79+iStuBKQdmamtlqNmTx8G1d1iDPsTVDMTZGQcAi:Nb4bZudi79LjxWtlqN21PijTURwrFA0a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 608 4391.tmp -
Executes dropped EXE 1 IoCs
pid Process 608 4391.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2872 wrote to memory of 608 2872 2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe 19 PID 2872 wrote to memory of 608 2872 2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe 19 PID 2872 wrote to memory of 608 2872 2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\4391.tmp"C:\Users\Admin\AppData\Local\Temp\4391.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe 9CA82E32E0487A456213CF5B332AD63AD1DFDAC0FEB0A95981E710A42F870952EC22D54093FD7CD69C6C0040A4D51B874ED87D8FA713BF47A17177FD78426AB32⤵
- Deletes itself
- Executes dropped EXE
PID:608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD589c6845a9922d4a30cc27b673c79e02d
SHA1d662280e3580f62c6b0d1618e007a6d71f17e1f6
SHA2566f9ca97a489ccbd7505129b98e4eb9a05a2012fa020f8ad0158df0499745fc4c
SHA51236caadb32e0f43ef8c92cb31f0f45569943182e78916fecf3f44803b499cea823aea0b42874cc038cecb1fcdc8a7dbb5189f8e11d0d75b3cbf3a257be3aaab2c
-
Filesize
44KB
MD5c90e6ae3d10d201d1ff2b0a21450b4a0
SHA15825dbd51d6dc37988f7357bdb970a8d83f85d07
SHA25690f02d2529c05c9d464ca4d92743a96d97b44572c8033ad2696e846a584ef248
SHA5127549082e716146e5aab30b75f4bbe7f31414fd26e0ec3cf0d82a406a1868d467c95c5f2356566b312622d739a3d28b34cf80729dcf9c9a4f5854bf4dbdfc0463