Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_f19cc24b72ba8fa8222d2ac4b0a2b8d5_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_f19cc24b72ba8fa8222d2ac4b0a2b8d5_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-27_f19cc24b72ba8fa8222d2ac4b0a2b8d5_mafia.exe
-
Size
433KB
-
MD5
f19cc24b72ba8fa8222d2ac4b0a2b8d5
-
SHA1
3124a6ed1f43a50de1997bc8986032e653f5777f
-
SHA256
1870438b84290ea0bc48c94951cced99fe380c0a3d5d86d812b5389683940285
-
SHA512
9192006193cc9ef0c8d017982c0f0856f9efb8f9d3113f15ce0ec5797efe87ef62ec56df7c21e79fc9c4d4e97c55a91643347c4302f0a90295252b72006be05c
-
SSDEEP
12288:Ci4g+yU+0pAiv+uzvMDFfuAstuF7XCMzon:Ci4gXn0pD+uGFfuAstuF+MzY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4804 3FC8.tmp -
Executes dropped EXE 1 IoCs
pid Process 4804 3FC8.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4804 4084 2024-01-27_f19cc24b72ba8fa8222d2ac4b0a2b8d5_mafia.exe 88 PID 4084 wrote to memory of 4804 4084 2024-01-27_f19cc24b72ba8fa8222d2ac4b0a2b8d5_mafia.exe 88 PID 4084 wrote to memory of 4804 4084 2024-01-27_f19cc24b72ba8fa8222d2ac4b0a2b8d5_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_f19cc24b72ba8fa8222d2ac4b0a2b8d5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_f19cc24b72ba8fa8222d2ac4b0a2b8d5_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\3FC8.tmp"C:\Users\Admin\AppData\Local\Temp\3FC8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-27_f19cc24b72ba8fa8222d2ac4b0a2b8d5_mafia.exe 5CE0F483286CB719158798EFA5E3AB568EF9C994D080F59036104E70A2D629B6CE7D694246C62EC0EAE7BFE2F486FED0DE0C76A77944354712152E9B68CFD02E2⤵
- Deletes itself
- Executes dropped EXE
PID:4804
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD56c6c9f7c6dc4520d2c22e75ba79b41c5
SHA1156d657a926cbcbdec58b240dd98680d2b356155
SHA25669523b86cb159dbcc14c79699edc437f4cbecf44d3d4e4314fa6dd722b53f7b7
SHA512c15363c70f1660282bdbfd576b0d54ad5a7133358569e128e5458e75ec559367f327b5638647f2fccbde264ec8871d6fd6a9af050a4a33cb627707c5e58784db