Analysis
-
max time kernel
153s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_2122081a06934db362494c6a4e052382_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_2122081a06934db362494c6a4e052382_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_2122081a06934db362494c6a4e052382_mafia.exe
-
Size
444KB
-
MD5
2122081a06934db362494c6a4e052382
-
SHA1
20e9334500462cb6df03c4a0335cde981565e61e
-
SHA256
0f807dc65b02082780f5d969f70aeb7b157bc56b3622592861277cdb01ded35c
-
SHA512
34f7d00bc7c512d9de1eaab0637d3f8b922d872276bda6db9e6cd74d7a0042b9f0fb078d31600cd59fa8e28987e8ab46a10170940f4f19fb6b8da34893082526
-
SSDEEP
12288:Nb4bZudi79LW7yeSNqETqrYrAvl8pBsg7ke5AA:Nb4bcdkLW21N3erhkbd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2004 C63E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2004 C63E.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3704 wrote to memory of 2004 3704 2024-01-18_2122081a06934db362494c6a4e052382_mafia.exe 87 PID 3704 wrote to memory of 2004 3704 2024-01-18_2122081a06934db362494c6a4e052382_mafia.exe 87 PID 3704 wrote to memory of 2004 3704 2024-01-18_2122081a06934db362494c6a4e052382_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_2122081a06934db362494c6a4e052382_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_2122081a06934db362494c6a4e052382_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\C63E.tmp"C:\Users\Admin\AppData\Local\Temp\C63E.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-18_2122081a06934db362494c6a4e052382_mafia.exe E8D393CBD23E79F66B5C71FA62B34C13988431F864D384366BFD4416D5055CFBCEC24404E4AB1E5A82495FF1996CEF8721F8C5F75A9479463E891DC39DC3585A2⤵
- Deletes itself
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD5e5eb185a23d2eec25024072e52c92a02
SHA15f8f9bb4a452a276d5984463e22b5af7489d140b
SHA256a8267b543c8b378f43088d8ec31a10b57bdf442983ba8758ea6bbf860e0a0a26
SHA51223342c2869ddd0b8f8aa3259eea2e3e205223e159ab616bb54a0870f722a106a68e3d2100425bcc0fc9962344a49f44a7b2750cb78732370c997371cb8a40646