Analysis
-
max time kernel
93s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 15:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_e539392b15377a4bda4b5af156103bfe_mafia.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_e539392b15377a4bda4b5af156103bfe_mafia.exe
-
Size
412KB
-
MD5
e539392b15377a4bda4b5af156103bfe
-
SHA1
905e97b7fef9b62bd027203e8f0bcd53db5440c5
-
SHA256
15d1416b3ff81a1e985160d5c250505a9fd18114b38d3541658e59f3065967a4
-
SHA512
eb361d30f2519533c241425d2a614087496b2d059471b637b5c306f331d4488163d9ed0ec4e9619a0f028659ae72421bfc9dae05f2d3fba8bd6ce8c51fb6bb94
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnKaHeCH3GDANTL/R7EHzNPDHvp1j6eCFQeupQaf:U6PCrIc9kph5UCHIAJiHZPdtCFTaec
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
3E03.tmppid process 2216 3E03.tmp -
Executes dropped EXE 1 IoCs
Processes:
3E03.tmppid process 2216 3E03.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-01-25_e539392b15377a4bda4b5af156103bfe_mafia.exedescription pid process target process PID 3472 wrote to memory of 2216 3472 2024-01-25_e539392b15377a4bda4b5af156103bfe_mafia.exe 3E03.tmp PID 3472 wrote to memory of 2216 3472 2024-01-25_e539392b15377a4bda4b5af156103bfe_mafia.exe 3E03.tmp PID 3472 wrote to memory of 2216 3472 2024-01-25_e539392b15377a4bda4b5af156103bfe_mafia.exe 3E03.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_e539392b15377a4bda4b5af156103bfe_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_e539392b15377a4bda4b5af156103bfe_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\3E03.tmp"C:\Users\Admin\AppData\Local\Temp\3E03.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-25_e539392b15377a4bda4b5af156103bfe_mafia.exe A6B4A3419C155E920CB544438AB58266557968A6334B39E0E1C4B03D8584E3D9F0A29868B418D12DF29EB171BB3B84A4EA0E7DF0F215C9A56E8A826C7A1445482⤵
- Deletes itself
- Executes dropped EXE
PID:2216
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3E03.tmpFilesize
412KB
MD523a836218b3c4b92473d0eaafa5fe434
SHA150df7dbb20b6737ecaedabc8da44396ec0b7a4c7
SHA256cd85aab6d0855dd1bb19cf8bb445101be5a8147f648a945bb50ad76093fd3aff
SHA512cbbf0c1b7fd588c25b0d56092e73ceff8bb815617165634097ebeb6c423343f6dc4977428786d87b550bf0e1c449523b912af614360ac3e3e5cfea59a2493a28