Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_8e7b1936d575359c907ecea9825f3b30_mafia.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_8e7b1936d575359c907ecea9825f3b30_mafia.exe
-
Size
486KB
-
MD5
8e7b1936d575359c907ecea9825f3b30
-
SHA1
0944a8ec2d229beab245ee347387191c9b953fb2
-
SHA256
d0cbfbfd4c33f649c5098282d19449b48531318b2ea786a7013ee082823da344
-
SHA512
a7d4d94988b68117d3df42d055a6e3aac94573c3a6c93a36f4683ca94e87df6313f7e0af70b46196cc71b163e501747a7cf3a640e6528719d4ba5dd2167eb4aa
-
SSDEEP
12288:3O4rfItL8HP2cb9c+F+Ka4FVocp7rKxUYXhW:3O4rQtGP2gplHocp3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
824F.tmppid process 1560 824F.tmp -
Executes dropped EXE 1 IoCs
Processes:
824F.tmppid process 1560 824F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-01-25_8e7b1936d575359c907ecea9825f3b30_mafia.exedescription pid process target process PID 3248 wrote to memory of 1560 3248 2024-01-25_8e7b1936d575359c907ecea9825f3b30_mafia.exe 824F.tmp PID 3248 wrote to memory of 1560 3248 2024-01-25_8e7b1936d575359c907ecea9825f3b30_mafia.exe 824F.tmp PID 3248 wrote to memory of 1560 3248 2024-01-25_8e7b1936d575359c907ecea9825f3b30_mafia.exe 824F.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_8e7b1936d575359c907ecea9825f3b30_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_8e7b1936d575359c907ecea9825f3b30_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\824F.tmp"C:\Users\Admin\AppData\Local\Temp\824F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-25_8e7b1936d575359c907ecea9825f3b30_mafia.exe 4F47409BBEF1A0C996585802680EA857A8F7FCE75C5E24CAD9D73860C3D42D271F96FC46E4F235DF524A2F59160384ABAAE106FCBEF133DD9F0FA57BF59FC26E2⤵
- Deletes itself
- Executes dropped EXE
PID:1560
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD56c8d43c4b1a040e9bbbba220afeaa1dd
SHA1f24f3db96311468e1f30f3ce6cefb80042eb2828
SHA256be2521b22dc01957d8140b7d96a4d574160e338801c7ac1bfd2f05bfef9d8d68
SHA5121f25662252e472587965072dc657c0c36bd2d5832837dbae172813ecc810997a3bd7fd6178a587ffcd71d566e91171533eb150db2a08a29ecaa2bbec51b19c36
-
Filesize
428KB
MD529a33a28b5f4fd86c2599d843bd1f02b
SHA19cdfd9079f1b75ca38b22a59be0b595cbc3d0ffe
SHA25616219bdd5086c3e1be4e46badc8b39b0ea1686bbaa7b0cbebccb67136e9d90da
SHA512ebffba3487657342b63a77b189467ab53db9ba8d8367704a7ea8a4afdb4046909ce70ef3fd61be2e4d255e669716d4f88aac9e3a81a7e6f7315939fd45aceaf8