Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exe
-
Size
479KB
-
MD5
9d8b66881928c8638e2c1135cd319a19
-
SHA1
5b8485638008da85cc9227118269e339b2f392d6
-
SHA256
d39e98ade8058a323ff38a9aafd0baeb911cd87c620504022c707a050aa27b42
-
SHA512
9eb3a21e6fe7e8c0178a3441bcf8ce2971fa33e09dbe86d6dfd681f60967f3b69a262dfc71326a406c2325f4aa6ca56ff26bd1f0e00c4bf51ddaafde3032ee01
-
SSDEEP
12288:bO4rfItL8HARaXN36wy6s1+7w0jNDTYPodMnA+ShB75UO:bO4rQtGARaXNK9Ww0jN3Yw+fShBVUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
E86C.tmppid process 2704 E86C.tmp -
Executes dropped EXE 1 IoCs
Processes:
E86C.tmppid process 2704 E86C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exedescription pid process target process PID 3516 wrote to memory of 2704 3516 2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exe E86C.tmp PID 3516 wrote to memory of 2704 3516 2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exe E86C.tmp PID 3516 wrote to memory of 2704 3516 2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exe E86C.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\E86C.tmp"C:\Users\Admin\AppData\Local\Temp\E86C.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-12_9d8b66881928c8638e2c1135cd319a19_mafia.exe 77AB59E3DE973191362927DF64A9A5906073A1D22E08C3BEF7880E5C1FC953B1CFDB315FA79AC8D16E234A2C92989E84BACBB5F98B980A63D453950D86568C672⤵
- Deletes itself
- Executes dropped EXE
PID:2704
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5be9537fb2669bfe476c4e91bb78af59e
SHA11b0e4be20dff8b9d269d576e4d04c0cfbf5e7ade
SHA25647718796a0b4acb6d2eb834c29139cd52aee272e4ed1952289f3b9f81758343d
SHA512bc6f71e09de3d00083dda37ef162a9591e6472bd284c4919de8b8ed8b094580de9d09518a4fbdfa6d4920b0f7f7dccd9a1cb77b052e6e0f646d1371ba82368a4