Analysis
-
max time kernel
101s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 14:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe
-
Size
433KB
-
MD5
e0f6be9ca07a4b8e1a868151399f9ae7
-
SHA1
85c535edb7347bb5b401696cc296e399fa890864
-
SHA256
66bcf2c9008d8092ad823a78a280066a18af0546c768a92535b2dba5f82d4673
-
SHA512
80f5666e8ba0129623662d754c5e42d667caef649f324c48c0c688429d52402241aba3def49a6eddfe390de409996ab77f6a7313cb5b58b20207f04b71bb43a1
-
SSDEEP
12288:Ci4g+yU+0pAiv+kwFqk4gGUx6/mIQ1bDmN6pmZn:Ci4gXn0pD+5qkIoI8bDl0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1080 5023.tmp -
Executes dropped EXE 1 IoCs
pid Process 1080 5023.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1080 1552 2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe 85 PID 1552 wrote to memory of 1080 1552 2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe 85 PID 1552 wrote to memory of 1080 1552 2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\5023.tmp"C:\Users\Admin\AppData\Local\Temp\5023.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe B927ACB08DCF1302E21627412EE56A9ACF0F9A10DB18C1AAD1C4A9BF508FA3412DEE3BF679E21A7973F340BEA7D4225F42CE439623EABF2A0A888A22528B4C532⤵
- Deletes itself
- Executes dropped EXE
PID:1080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD56d6263275e571880e46d2b741fa236f3
SHA15185d7e4ad10503f025a1ce6ec8c58ea4cc782ca
SHA256563c81f6ff5026f03cc865e63fd91e8c74ef5487c5b2bcdf585ff3a460a6c1a7
SHA512e25596bb111e7132b161433dc7875a99e019cfe5f8892ea980f0c5edb98f11742eabf6e9e588685a18743a413a7464bc3640583345ab58001738258172f9e45e
-
Filesize
119KB
MD530c426b08af84f9899f061966d64b9a4
SHA1340177fed689f7eed42fe0fb32904939ec7ccc5b
SHA25634b225d5ca15263a58db77a493d5ee352c7ce39f3be27671401d461babecd489
SHA5125db62b4f07d2e83c32b50c8bd248909702172b2be5339a4fa6db1241c64ac0200dd902a83d4feb96c294db4464ea2e5d4bf5b328529146c93203db4a93cb20a0