Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-06_c0e6ae80c92531cc49b58caaebed97cf_mafia.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-06_c0e6ae80c92531cc49b58caaebed97cf_mafia.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
2024-01-06_c0e6ae80c92531cc49b58caaebed97cf_mafia.exe
-
Size
411KB
-
MD5
c0e6ae80c92531cc49b58caaebed97cf
-
SHA1
0ce0f7664bc94cdc21e1bcea60c9267702631bed
-
SHA256
c765ab1ee0fc629b82f78f7d0d8182aef42ddd28aed38a95b7b12bd5f02dd1d2
-
SHA512
e47aa56ebf5bdca0aef7fef00a8eef3ae61e98d282a71910df31840ee6c7b33f23b82ea985c36ff85e880ae5850e01421682392010fcdd43fa3d4316ea7570a4
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFwddnAlDATjsSumbfQxJDbWA+ylxGHBA+PqH:gZLolhNVyEv4DATjlrQxJXHsW+PqH
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4660 4A28.tmp -
Executes dropped EXE 1 IoCs
pid Process 4660 4A28.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2776 wrote to memory of 4660 2776 2024-01-06_c0e6ae80c92531cc49b58caaebed97cf_mafia.exe 21 PID 2776 wrote to memory of 4660 2776 2024-01-06_c0e6ae80c92531cc49b58caaebed97cf_mafia.exe 21 PID 2776 wrote to memory of 4660 2776 2024-01-06_c0e6ae80c92531cc49b58caaebed97cf_mafia.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_c0e6ae80c92531cc49b58caaebed97cf_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_c0e6ae80c92531cc49b58caaebed97cf_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\4A28.tmp"C:\Users\Admin\AppData\Local\Temp\4A28.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-06_c0e6ae80c92531cc49b58caaebed97cf_mafia.exe BEFCC1D20EEF15C829E5750F14D2BF6BC0E5FB87A9FC8B0FB8ED2136837DA858113D85CE630F560BC624CD9A9B06C699B4AB27A4EBEF73CC84D3DB690A39223D2⤵
- Deletes itself
- Executes dropped EXE
PID:4660
-