Analysis
-
max time kernel
160s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_d5995a329ced734b29e3f87c62120c41_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_d5995a329ced734b29e3f87c62120c41_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_d5995a329ced734b29e3f87c62120c41_mafia.exe
-
Size
444KB
-
MD5
d5995a329ced734b29e3f87c62120c41
-
SHA1
02805daec4b55c78779d8fa27cb4401e9627b74c
-
SHA256
878000934a8d686d6da04287c6d7631c5f38dbfc839efcab27de595845bc4138
-
SHA512
3aa5541b20c07da774d78768d782ef2a8d4abbbdb3cb105d13334e86a77c93939687b3ca3a972499fa43ed3a1b38b5490f8afee2b2376cb61cde8147dfd5dbf1
-
SSDEEP
12288:Nb4bZudi79L21aDjWd5JOb1rXFHBAGvRA:Nb4bcdkLhWO1pHWq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 B20A.tmp -
Executes dropped EXE 1 IoCs
pid Process 2604 B20A.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4812 wrote to memory of 2604 4812 2024-01-11_d5995a329ced734b29e3f87c62120c41_mafia.exe 88 PID 4812 wrote to memory of 2604 4812 2024-01-11_d5995a329ced734b29e3f87c62120c41_mafia.exe 88 PID 4812 wrote to memory of 2604 4812 2024-01-11_d5995a329ced734b29e3f87c62120c41_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_d5995a329ced734b29e3f87c62120c41_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_d5995a329ced734b29e3f87c62120c41_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\B20A.tmp"C:\Users\Admin\AppData\Local\Temp\B20A.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-11_d5995a329ced734b29e3f87c62120c41_mafia.exe 9D334809FB8688E4BAAE21CE5673B5A6AAEA6CC0F751192C20B5F3AAE31FC7BEA08BABCC5011CC80A51E282B46C83A0CADDB7F03EED549F55F81B4669538C97F2⤵
- Deletes itself
- Executes dropped EXE
PID:2604
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5ba66059bc449813da8734f4e43b4e215
SHA11d06d6a8bb680dcaa6a04987e79c8d7a2bc10d71
SHA256bd1937af4f910cf2b706db10200be80fa9c093b6a45e6174d0ef88266180b04b
SHA51214573bc8d581aaff8b501d8a359671ae71c76582a32fa510e8f799192502a4bb34e303b5cf529f62ca6779b02268293b38705353edf77a0b8b8bf25232234aa6
-
Filesize
209KB
MD5e1967799abbcc9368ef3695edb3617ef
SHA15af3427a4e9e62e876f30695e2b89b48d6fa937f
SHA25627628ee1b64a4964e0951c514cfc552d955b283a86d166ac70ac613b565a54af
SHA5129599905d7bdfd59a4a49ded3b2ef6ebbbeed6048f6214624721ce3aaf952858aca8570fb78c77e478a48a0a36c0adf43bf7cec73a8ffe1ea51f9702fb312dc54