Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exe
-
Size
486KB
-
MD5
a6a009f6f90f5707eab8790a82be2be9
-
SHA1
0de7f139a44b47a8420d738232a65b8e34dabfcc
-
SHA256
6e00a249c0d98218902738d797848719bcb5d88a540b5a977f4622cc26ed9642
-
SHA512
801e49b5a147bfd87c01bd062e2eacfb7064b1633b64a90b3f19cde5e5cec3c9f7c55c55f058ad3fb61ea2b1cea187f149af88cf55d8640ab96eab94a1e38d32
-
SSDEEP
12288:3O4rfItL8HP9Nufx3/v4KWkayFnY7rKxUYXhW:3O4rQtGP945PQNkaEnY3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
69C6.tmppid process 2012 69C6.tmp -
Executes dropped EXE 1 IoCs
Processes:
69C6.tmppid process 2012 69C6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exedescription pid process target process PID 1460 wrote to memory of 2012 1460 2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exe 69C6.tmp PID 1460 wrote to memory of 2012 1460 2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exe 69C6.tmp PID 1460 wrote to memory of 2012 1460 2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exe 69C6.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\69C6.tmp"C:\Users\Admin\AppData\Local\Temp\69C6.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-12_a6a009f6f90f5707eab8790a82be2be9_mafia.exe F75E65F7048530263D7EE07788A9475EAD3E8368060645F69A51666DF27F02ADCA056575A8654646AB952CA2A9CA864046E71CF817327368A8DC322229C3BA5C2⤵
- Deletes itself
- Executes dropped EXE
PID:2012
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD58ca5346bccdbf589dec04156b8dae9fb
SHA18c6633749db857d1d0ab272ba4662ee3cea11d85
SHA256b45445492def2e7b4c9e8ec0abab05f741be46b6930a2d3e84c1d2e2cde91a80
SHA51211abb922c29fdd407bebbfe8dea33756fb32dac2c9d42bfe6e97d46e52045e15928f02d652fc2700424b4627e85cf6942f1795adad30278572e1f356b2e15707