Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_393e5c6569575f83691954da0e58ace3_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_393e5c6569575f83691954da0e58ace3_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_393e5c6569575f83691954da0e58ace3_mafia.exe
-
Size
433KB
-
MD5
393e5c6569575f83691954da0e58ace3
-
SHA1
b68fe34ba014d9199462ac3e686153dab78fc64c
-
SHA256
7b8c6669a108320fa9ce7d0836d95911036a756b9c5cc0496bdff482e151ac6b
-
SHA512
dbfb73afd58ca062a82dadb3ecb9ce192861729ab9272cf60e2c93985b014566df56515c779592c88d6a7c737e3c4c91f3a576abbf91992bdb4891a4510fa7c5
-
SSDEEP
12288:Ci4g+yU+0pAiv+R/gKl76rN8poAN52wo/Kn:Ci4gXn0pD+BgKV6RooOeC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4812 6B9B.tmp -
Executes dropped EXE 1 IoCs
pid Process 4812 6B9B.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1896 wrote to memory of 4812 1896 2024-02-04_393e5c6569575f83691954da0e58ace3_mafia.exe 84 PID 1896 wrote to memory of 4812 1896 2024-02-04_393e5c6569575f83691954da0e58ace3_mafia.exe 84 PID 1896 wrote to memory of 4812 1896 2024-02-04_393e5c6569575f83691954da0e58ace3_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_393e5c6569575f83691954da0e58ace3_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_393e5c6569575f83691954da0e58ace3_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"C:\Users\Admin\AppData\Local\Temp\6B9B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-04_393e5c6569575f83691954da0e58ace3_mafia.exe 22B460CAE3B81D768F9D6F8D2308A86B85A721153F0F5A417C3D9CB2397E6C40B7C48F8A6250C6221D4F7D0B00DC8533481581FFBAD912DA34F2946948A32C542⤵
- Deletes itself
- Executes dropped EXE
PID:4812
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD51eb196834f2d8a553391e3fad764b37a
SHA1fd900047157a7d51120e9051d642efa94d087ad7
SHA256d054b97b6c38b7814b3bdbbe32bf7219129d55ae6833b8b86b68bb0c08be575b
SHA5120f7c3ee784ee501d418071965455028bdcf1f5c6846984f307969ec5fac9f8f50120a8d550e41790ee633f0f3e89c5273b3646b02bbf4c51ed70fdbdf778df5f