Analysis
-
max time kernel
144s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_d70d9b31e9bf56bf8fddae931dcd5f91_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_d70d9b31e9bf56bf8fddae931dcd5f91_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-25_d70d9b31e9bf56bf8fddae931dcd5f91_mafia.exe
-
Size
433KB
-
MD5
d70d9b31e9bf56bf8fddae931dcd5f91
-
SHA1
f7b33713e7ebee0774c48221aca1869cdf3d5ca1
-
SHA256
bb87d9dd9caf00755c6273521f5cf62c10c7a83f9da761fb1a86929fd8928852
-
SHA512
2721e89297d99347fdc91d62c88c680573ae09880e868271a08e9a0e33f5665bc96c6ba1a061b24542d2b3ce09e25334dccf44e81a8c24bd14c37a4108d7db0a
-
SSDEEP
12288:Ci4g+yU+0pAiv+XXQ6q2qpPD5m6/SChs8Vfhn:Ci4gXn0pD+QN75m6/RhpL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1868 20E1.tmp -
Executes dropped EXE 1 IoCs
pid Process 1868 20E1.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1868 4380 2024-01-25_d70d9b31e9bf56bf8fddae931dcd5f91_mafia.exe 88 PID 4380 wrote to memory of 1868 4380 2024-01-25_d70d9b31e9bf56bf8fddae931dcd5f91_mafia.exe 88 PID 4380 wrote to memory of 1868 4380 2024-01-25_d70d9b31e9bf56bf8fddae931dcd5f91_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d70d9b31e9bf56bf8fddae931dcd5f91_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_d70d9b31e9bf56bf8fddae931dcd5f91_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-25_d70d9b31e9bf56bf8fddae931dcd5f91_mafia.exe ACAF1F91BC22C26F82A4E695178099DEFF827A1A60DE8D390F91B8ABD9A3F01B167B5098EA3888384DC14F740616BA0E555699A3223D902D030DB178C4FB84382⤵
- Deletes itself
- Executes dropped EXE
PID:1868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD515b2e64af15d3976d196ce95332f7122
SHA1e3fcc61dccb5523cbf9498ebd38ea6c958e39904
SHA25699cb820d2cc6c36fc268d3093bc0d8eac9de2d23e4090f1ed6762c0f23ca85d6
SHA5126a9de7cbf9d605a65f57ad5384dd166c71f8ddbf8c7e58b0733ade0cf07484a2b3b2b4e10644258bea1c8394fb19be994620e234682de3d9e04d9265f65a5e33