Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 12:19
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_fea5ce7386e4bb6342c7f469e776743a_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_fea5ce7386e4bb6342c7f469e776743a_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_fea5ce7386e4bb6342c7f469e776743a_mafia.exe
-
Size
486KB
-
MD5
fea5ce7386e4bb6342c7f469e776743a
-
SHA1
f9f09739f5be7716801f23f774be97244cc86109
-
SHA256
9f634f4b14c1c3788babf72d6cc42ac610c5db2f8be2c5dd407691b9a1dad9a0
-
SHA512
62e69bad84df9b6699ac4bd4b500f40a2230869c4a27e14c951e9f60d9d69ab09796afeb98188e6278233c2bf54ffa9c38f62a2aa8dd2ad87992f0749f62abc3
-
SSDEEP
12288:3O4rfItL8HPKSF59VuwCaIxF54q2dy7rKxUYXhW:3O4rQtGPKSlIpxIqmy3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 864 4BAF.tmp -
Executes dropped EXE 1 IoCs
pid Process 864 4BAF.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 864 1704 2024-01-06_fea5ce7386e4bb6342c7f469e776743a_mafia.exe 87 PID 1704 wrote to memory of 864 1704 2024-01-06_fea5ce7386e4bb6342c7f469e776743a_mafia.exe 87 PID 1704 wrote to memory of 864 1704 2024-01-06_fea5ce7386e4bb6342c7f469e776743a_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_fea5ce7386e4bb6342c7f469e776743a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_fea5ce7386e4bb6342c7f469e776743a_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\4BAF.tmp"C:\Users\Admin\AppData\Local\Temp\4BAF.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-06_fea5ce7386e4bb6342c7f469e776743a_mafia.exe FA015911417DF47620177FFCEE7183089311694285739151E4B53CEDF52D9A208CD78D0AB6D46C062F1B3CA4C7A64044B72B8B5F612F3867B43DE3F12D62A34E2⤵
- Deletes itself
- Executes dropped EXE
PID:864
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD59aa96110af1fe4e6c625f81bbccc8b3c
SHA1a9301a21c095c850d0a588b0650a8c11bbd1047e
SHA2562dccd154dd6425363f8bab6906e11724e475d4ffebba2a7fede1b9f740916dfd
SHA51259388b720149a9127e89fa0659e59b1877c07d45123587d7d9695bbe0657e15a87fe3c632354421760f450ef738be6d98d529e3a20ac837eec770920a06c7f3b