Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_8bda594e8bace24782556d903a9b4818_mafia.exe
Resource
win7-20231129-en
General
-
Target
2024-01-25_8bda594e8bace24782556d903a9b4818_mafia.exe
-
Size
433KB
-
MD5
8bda594e8bace24782556d903a9b4818
-
SHA1
bf7dc7426430536caca847f23662fcd0928577c2
-
SHA256
508f99c09bb8caf08846b21e3d6feb1c12defce64e892f90c7a2d83025632de6
-
SHA512
4a953970a8737959db575b4c544d52c63653a44090c47c495da42f554b168fba765accb63d359a73bf40d8fdc79fa7d82595380368684f7c0e2e0c36ceeaee5f
-
SSDEEP
12288:Ci4g+yU+0pAiv+0BSAnIbkZKAVJtAEvqNkYPRppsNDOkzn:Ci4gXn0pD+bctS7ieqQm
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
4B80.tmppid process 4116 4B80.tmp -
Executes dropped EXE 1 IoCs
Processes:
4B80.tmppid process 4116 4B80.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-01-25_8bda594e8bace24782556d903a9b4818_mafia.exedescription pid process target process PID 4000 wrote to memory of 4116 4000 2024-01-25_8bda594e8bace24782556d903a9b4818_mafia.exe 4B80.tmp PID 4000 wrote to memory of 4116 4000 2024-01-25_8bda594e8bace24782556d903a9b4818_mafia.exe 4B80.tmp PID 4000 wrote to memory of 4116 4000 2024-01-25_8bda594e8bace24782556d903a9b4818_mafia.exe 4B80.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_8bda594e8bace24782556d903a9b4818_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_8bda594e8bace24782556d903a9b4818_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\4B80.tmp"C:\Users\Admin\AppData\Local\Temp\4B80.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-25_8bda594e8bace24782556d903a9b4818_mafia.exe CB958502D5D1183BE34B6E675FA81446DF3B978030261B5561527201BA48A6A4B67F2F7B420FF64B74F8F02DEE11C803E8134643F94F891FBC7A430BA49F00562⤵
- Deletes itself
- Executes dropped EXE
PID:4116
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5f7daa47f41b66dff73d9294d7f2a47ca
SHA13a517f76ec383df0450421c2f60941725b5dc692
SHA256afb9b2c664baeeca328c883ae349bb96b7cee8ad2f1121255437cb1be2434af1
SHA512801bb0fcc5a0d99504d2567165e0ddd5b362b8572bbe1d22d2db23cb2e4f75e89ab69b9a722046fe10d566454d9c0ceaf07d8735b6bbdc96cd10791448dc83e2