Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_769c216fd9088b75e577ebd41ddc5ef7_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_769c216fd9088b75e577ebd41ddc5ef7_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_769c216fd9088b75e577ebd41ddc5ef7_mafia.exe
-
Size
486KB
-
MD5
769c216fd9088b75e577ebd41ddc5ef7
-
SHA1
647273c6eae1485e3af69f4e56615b28f27f1514
-
SHA256
6588866dcac44978fede34977ff27e45da9af8b957a0294731a763610ced2306
-
SHA512
e46f4749e0ba255a5ff5bf5e67f54e3bc78f9858fdbd173fb5114ca04b4ccbe36f24cb8cb2a844e255599fddf744700f1e7799d6825a333fe5fdd7e5e5cb57fe
-
SSDEEP
12288:3O4rfItL8HPd377wAM45BQzWJRs7rKxUYXhW:3O4rQtGPdLkH45BQzWA3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1548 43FE.tmp -
Executes dropped EXE 1 IoCs
pid Process 1548 43FE.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1548 2652 2024-01-27_769c216fd9088b75e577ebd41ddc5ef7_mafia.exe 87 PID 2652 wrote to memory of 1548 2652 2024-01-27_769c216fd9088b75e577ebd41ddc5ef7_mafia.exe 87 PID 2652 wrote to memory of 1548 2652 2024-01-27_769c216fd9088b75e577ebd41ddc5ef7_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_769c216fd9088b75e577ebd41ddc5ef7_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_769c216fd9088b75e577ebd41ddc5ef7_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\43FE.tmp"C:\Users\Admin\AppData\Local\Temp\43FE.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-27_769c216fd9088b75e577ebd41ddc5ef7_mafia.exe 0BDBDE4C876DB049A1A9696784EBC211B05BD0A1677C2D57FF7FA5E771398FAF80EC8AAEC45563EF0EF9B7E99ABEE6EB72FE46EC0E93CC5678559EF869989C022⤵
- Deletes itself
- Executes dropped EXE
PID:1548
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD56bb87137cbc222c2e627181ca488ba7d
SHA14f5ab7880e0d4b000a38b4a9c054224197c806b3
SHA2569ba11201bef00bfe86e5c71099a2f9f9cee11453a50a61666add20f199814af6
SHA512fd04b10654bb9ba12ff6802bd061676102e09073613a1f7c5404114b33bcc8c64f44efe194322348d310cbbc863873606a77ca0d17b215cb81d6f7c0c69f8fec