Analysis
-
max time kernel
90s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_9525bb8dcd76d3752667ccb33c8a13eb_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_9525bb8dcd76d3752667ccb33c8a13eb_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_9525bb8dcd76d3752667ccb33c8a13eb_mafia.exe
-
Size
428KB
-
MD5
9525bb8dcd76d3752667ccb33c8a13eb
-
SHA1
8442797c1b804dc88e003e2616bae4a0f98a5733
-
SHA256
3585b8de61ddaa402f67eb499e7ea30cb73debc223cfcff891802c604e9e1ec7
-
SHA512
4f9c74fd7f9a5c8b697686f2c4a6c100201571a2207ddb5446bbca1c8c2c8b007e2adde29ac3d63e6d7723ea901523f38c8573c1b8246e5131b5c62f61c199ee
-
SSDEEP
12288:gZLolhNVyEycmqkn/EFvVJcB7aURDsqHR:gZqhOEoLEUaUR3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4796 395.tmp -
Executes dropped EXE 1 IoCs
pid Process 4796 395.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4796 4764 2024-01-28_9525bb8dcd76d3752667ccb33c8a13eb_mafia.exe 84 PID 4764 wrote to memory of 4796 4764 2024-01-28_9525bb8dcd76d3752667ccb33c8a13eb_mafia.exe 84 PID 4764 wrote to memory of 4796 4764 2024-01-28_9525bb8dcd76d3752667ccb33c8a13eb_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_9525bb8dcd76d3752667ccb33c8a13eb_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_9525bb8dcd76d3752667ccb33c8a13eb_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\395.tmp"C:\Users\Admin\AppData\Local\Temp\395.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-28_9525bb8dcd76d3752667ccb33c8a13eb_mafia.exe 1B5377D3AF62D9D0C032EFA5C5D254E7CD075779969040D1C0D6B8ADAE1D40B0B9060202DDEACC3EFA0C488E65BEA39F3514642C47AAB642F47BCD90D3444D412⤵
- Deletes itself
- Executes dropped EXE
PID:4796
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD533416a2781307e0ca82e6090562eac38
SHA118be59f1e0242a8628fec778b15c2f316b67ecde
SHA2566dc461456e4ca7bceccb3a4734b43efa71b72555928d495574edaab4c107d513
SHA512151f40649c34440574a733e76952160dea5e0a986c937b05387fb2360ded89130648d40b8e18c8d89f667420ceb75c88ba70948fadf9737fd24e2cf162324c74