Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_26d4aac159a5284a0bee4bc2d4dcab76_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_26d4aac159a5284a0bee4bc2d4dcab76_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-29_26d4aac159a5284a0bee4bc2d4dcab76_mafia.exe
-
Size
384KB
-
MD5
26d4aac159a5284a0bee4bc2d4dcab76
-
SHA1
1f1d8e90317c4aefecdcf5e21b0397cf43a5868f
-
SHA256
dd5e5abba4454a9e2c9c6d63aeb3e547c11400549802c77f0825c2c08b609c0c
-
SHA512
6b15e27f5e3194f078801cf7b9127ba5433ee432bfaf0b318238379d1284875240e73f26d1c466a276f3382c9ea97897f30b5b139f7b311177542956a6af8a0b
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hHAcUEOqmR4WrOko/DmuSUBNsgDCFmt3+x7fJZ:Zm48gODxbza4I4WrOkoySQgmQ5+xbJZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2932 878F.tmp -
Executes dropped EXE 1 IoCs
pid Process 2932 878F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 2932 3624 2024-01-29_26d4aac159a5284a0bee4bc2d4dcab76_mafia.exe 83 PID 3624 wrote to memory of 2932 3624 2024-01-29_26d4aac159a5284a0bee4bc2d4dcab76_mafia.exe 83 PID 3624 wrote to memory of 2932 3624 2024-01-29_26d4aac159a5284a0bee4bc2d4dcab76_mafia.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_26d4aac159a5284a0bee4bc2d4dcab76_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_26d4aac159a5284a0bee4bc2d4dcab76_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\878F.tmp"C:\Users\Admin\AppData\Local\Temp\878F.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-29_26d4aac159a5284a0bee4bc2d4dcab76_mafia.exe 573B5DA8DB9913040844576A23DB4FA4062F9A83DC1E7F8C7A1AC98E3D120D35BEEBDBC7B2B1AC14FD1C89446284FF060F947DE39CAE30647E49B648CB5B01EC2⤵
- Deletes itself
- Executes dropped EXE
PID:2932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5f95919d8347b81fa6ce7f5425f36514e
SHA1256b4e54b41fc520c5b5cb0a06405fd996f3d6c9
SHA25680f7ded59cc88e99d306d58ea1ac173a225d1a028436073726b5a17c88e67036
SHA5129a7876ee8ed08e53a9eb21f533fb547dbfd07bd3ce05837783f1d967747ec0ea32fe2f204fe0294d9ce5b2780273b2793ce7a0a5ba69abb90ea7de010bae2486