Analysis
-
max time kernel
2s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe
-
Size
1.1MB
-
MD5
037fde637702f7ff634357894335ba39
-
SHA1
fd0774e4f0c56d4bed6fcb35c381c30401e507b6
-
SHA256
ed20836f3dcf14d5d7b1690e6813ce2ad1b5d28091f2dc3fae7642f411465f65
-
SHA512
ff6f3574f9fa1769720d384a4b32a1f522ca0ab4f67e31e02e314e2c06029c0a9199e110bc2aaba9ee3a4c99760623447bd83f7ef653750c1b0dabbafea7ff69
-
SSDEEP
24576:Iq4w/ekieH6rteW5zgpH5IvSV5NQELQ+ObwyZtpLDNr49oKZbH6:Iq4uekieH6B7gIW5iEOw+rDNU9oKZba
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4768 493E.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4768 493E.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3800 wrote to memory of 4768 3800 2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe 16 PID 3800 wrote to memory of 4768 3800 2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe 16 PID 3800 wrote to memory of 4768 3800 2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\493E.tmp"C:\Users\Admin\AppData\Local\Temp\493E.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe 494BE31FB114FDA92D22DCC02464F0D73C90E7EA04D6BE58BD7198A3BDA41B4CF42A6AF8A2E8E235FC3B32E20BC4ECE2CB9622BF8A27D73ADC362C49F92469362⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_037fde637702f7ff634357894335ba39_mafia.exe"3⤵PID:4312
-
-