Analysis
-
max time kernel
207s -
max time network
226s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_a4b1a3131254b5af3a84022115f7af99_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_a4b1a3131254b5af3a84022115f7af99_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_a4b1a3131254b5af3a84022115f7af99_mafia.exe
-
Size
468KB
-
MD5
a4b1a3131254b5af3a84022115f7af99
-
SHA1
95452fc4e2d6132703b7655cd1a57ccb0c1dca08
-
SHA256
5b76d98335dc90aaf76a3578541e192191c5a379bf90d16e151780c09d8e7a4c
-
SHA512
9b415f70e6df05fe19bc7f0b9717285e834440359059868ac106f56d55089343c32422c0e56303a55b2641d8bb4c8ede9b3e5a4157076660fda34a7a556e3ea7
-
SSDEEP
12288:qO4rfItL8HGSs7vHF3lGT3K1RZztYMWyZdaHh7bWmeEVGL:qO4rQtGGSsbl3WK1RZzt5W+IhumeEVGL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2060 95D.tmp -
Executes dropped EXE 1 IoCs
pid Process 2060 95D.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 2060 4704 2024-01-18_a4b1a3131254b5af3a84022115f7af99_mafia.exe 89 PID 4704 wrote to memory of 2060 4704 2024-01-18_a4b1a3131254b5af3a84022115f7af99_mafia.exe 89 PID 4704 wrote to memory of 2060 4704 2024-01-18_a4b1a3131254b5af3a84022115f7af99_mafia.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_a4b1a3131254b5af3a84022115f7af99_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_a4b1a3131254b5af3a84022115f7af99_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\95D.tmp"C:\Users\Admin\AppData\Local\Temp\95D.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-18_a4b1a3131254b5af3a84022115f7af99_mafia.exe C301025F9BB84C61B56DE6306E1C80BE94141D084ED57EF5BCCE43CC347CEEFF31248907AE136609E62E7065A2FE2ED7F9F8A034A2A032A90DDE31C9F4F1BBE62⤵
- Deletes itself
- Executes dropped EXE
PID:2060
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5580408dd241010565eee8349b17460a4
SHA1868544f79dcd22d62f05c9d880c43d54b49ec452
SHA256902a720cc0f520ae78caa448057704020ec483f3ae269d486f90a2ea96527b86
SHA512ab1d64fa3c0b3c2ea417754909a893f5a3430ae651882cc26728889c5f973577e0ca78d0e5994f329ae595e12f3bc9cc59f7d7606f1925dbe112ed5f503e0cfa