Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_558b58667052f577b887991136c7180f_mafia.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_558b58667052f577b887991136c7180f_mafia.exe
-
Size
384KB
-
MD5
558b58667052f577b887991136c7180f
-
SHA1
2e41b26e351763b43142093acbdd756bace20134
-
SHA256
19034176249967b97e2fd19b7920e4ab4f7972e08979f898d5e44fc29d4ee1f9
-
SHA512
b908fac52e49e98f958e6c784db4453c6462177040e3f5e8dc59107a716230f0a7ea9b753b40306e9c63545279eeeb958333fe0cf24e56c10c1c7273f3685d9f
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hHue8qnhRU5gyAk6F3oVcBwvnNeBQsZCZ:Zm48gODxbz0e8qhq5/6GmMMuZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
48E0.tmppid process 4940 48E0.tmp -
Executes dropped EXE 1 IoCs
Processes:
48E0.tmppid process 4940 48E0.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-01-25_558b58667052f577b887991136c7180f_mafia.exedescription pid process target process PID 4796 wrote to memory of 4940 4796 2024-01-25_558b58667052f577b887991136c7180f_mafia.exe 48E0.tmp PID 4796 wrote to memory of 4940 4796 2024-01-25_558b58667052f577b887991136c7180f_mafia.exe 48E0.tmp PID 4796 wrote to memory of 4940 4796 2024-01-25_558b58667052f577b887991136c7180f_mafia.exe 48E0.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_558b58667052f577b887991136c7180f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_558b58667052f577b887991136c7180f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\48E0.tmp"C:\Users\Admin\AppData\Local\Temp\48E0.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-25_558b58667052f577b887991136c7180f_mafia.exe 347B5AE3B1424FC52394E607CF62624AE8336560DABD410E7259C40148599507CA2DB96CED3A9789A19A2A2426C2311A75B2452DC1A12FFADAEAFE3F228408792⤵
- Deletes itself
- Executes dropped EXE
PID:4940
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\48E0.tmpFilesize
384KB
MD552091876368b9118caed42dc62dbea63
SHA15d37fbafdd41827869d54b918bc5a1c367dec815
SHA256f29e6266ec755d039bff69fac12b85d062bb57420a581cc7947c6585e70fc0a8
SHA51295ff9a8b2b60ffa734805bcfd1255662d27cccb93db1a545eb4c6c37c8cb505d083b22aa054fa324793b2b57ef221eb02109f7b467056afc9968718d046b9d50