Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe
-
Size
384KB
-
MD5
d332554c641a77dd70562f87ea9675f8
-
SHA1
bfb077f355ab2fc1c6fb322970e109bcc63edfe1
-
SHA256
e6deb06b9b5e6494412c55c2b430c8921aa056960d262df1577d5f381ca83c8f
-
SHA512
aa5bcd46fa1d88dae84a264dcde359f7e99f6b99c3ed7c751b801778b116ddc398b86a9c45932791e04963dd60910a863e7bd3b85741ef5a043d8cf051326a70
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hHGbGQDvE1ZuGg9LSVQoJfCmf2F2LjbNW27Z:Zm48gODxbzoDwEG5eoJfCmA2PbLZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3276 6BCA.tmp -
Executes dropped EXE 1 IoCs
pid Process 3276 6BCA.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 3276 4548 2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 84 PID 4548 wrote to memory of 3276 4548 2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 84 PID 4548 wrote to memory of 3276 4548 2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\6BCA.tmp"C:\Users\Admin\AppData\Local\Temp\6BCA.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 1B7D07127C4CF4EA9C574563FD131456755329D3EF7EF4E3DB5533E0A50120A406D9DAB765DF6BBACCD0E16402AC47ED0B4134F828760CDD10A2400946F5618E2⤵
- Deletes itself
- Executes dropped EXE
PID:3276
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5af9e91a8d2c307192e55368c5b325b18
SHA157b18995942cb8fb6b39a94711ea6bdfe0b29b1a
SHA25687b521f4e85e03a09ce510cf1e4bbbc09753180287c0c78500e0656d9ac76201
SHA5126285c1af8851d7da92e3f53561eb0eeceecdaa2b34b55906eb4f17abccd6472fcfee5837bc49d7a970c2b03cf9a6806808d8fddaeac8e544e3f904544263befb