Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_c1b2e01c2875e9d199475892c91ffde3_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-18_c1b2e01c2875e9d199475892c91ffde3_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-18_c1b2e01c2875e9d199475892c91ffde3_mafia.exe
-
Size
468KB
-
MD5
c1b2e01c2875e9d199475892c91ffde3
-
SHA1
5801b45fe6d67e14e2b7768314add64d5d1fe8b1
-
SHA256
50e57477d780c05bdf8782268fe1bc6f09c2abc1c3f55c90429a7ba92ad19943
-
SHA512
f83b2b352f9f019eec2fbbbb8a73233dc979ed08e93c759468e7f26c3d71bee61d5878736de20f79a86e9431c669854e42c1789a950330f0de446a29fd0095b5
-
SSDEEP
12288:qO4rfItL8HGBvd2TFgRk4JIusBE983zurwwv7bWmeEVGL:qO4rQtGGr2TUk4IfXtwvumeEVGL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4040 4E4F.tmp -
Executes dropped EXE 1 IoCs
pid Process 4040 4E4F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5108 wrote to memory of 4040 5108 2024-01-18_c1b2e01c2875e9d199475892c91ffde3_mafia.exe 30 PID 5108 wrote to memory of 4040 5108 2024-01-18_c1b2e01c2875e9d199475892c91ffde3_mafia.exe 30 PID 5108 wrote to memory of 4040 5108 2024-01-18_c1b2e01c2875e9d199475892c91ffde3_mafia.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_c1b2e01c2875e9d199475892c91ffde3_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_c1b2e01c2875e9d199475892c91ffde3_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"C:\Users\Admin\AppData\Local\Temp\4E4F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-18_c1b2e01c2875e9d199475892c91ffde3_mafia.exe 1E10D8D0158B69DC2DC8122708C6105BF693154A94EA83B9218D39788472332A34800F50AADCBF7040A2D5AB225717321344FA8DF6BD53F5788364B50653820C2⤵
- Deletes itself
- Executes dropped EXE
PID:4040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD59d4a54c703f163e829b90c434779f982
SHA15ed6ae00f2ffd9af63d0e89214d690c6afc4ecd1
SHA2566121c9901d7d1f1437a3b0d6aa3f3152dfeb4296ac98176a003dcd937c099fd0
SHA5128d4b57cbc2142e1b7a3310f6e62ee5e391508365a409ce90b174968c7e747636f97f89bacc7e01bf793d74beb4a97c293b0225f937f6f97df0679696423c55f7
-
Filesize
120KB
MD54dcd80690e9c395522446fe3e46e7b4b
SHA1678f539fa27794b5520380336c5f6aefde511513
SHA25621002ac57a5ab2dc255ec56aec0cf7a494067d8181ed9d2c54e7e5535c1a4e73
SHA512ee258f6559a9ae1332f0ce729ad3530099b02d3dab7e2c8e0d71a3065d143a5d30b10c54f01a4af7d25fa27b7f98b08ec4a793c58348545bd683cb0642503d4c