Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 17:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe
-
Size
486KB
-
MD5
e2aa84af27b29dc9787ceeb16b3b1983
-
SHA1
bfc2a54d1e6058219c651971bb68eee0bb59ba60
-
SHA256
cbc8dc23b5b1cf72a70989d5e4337967b9a825eb66104a3d208a815158ba8865
-
SHA512
aaa0ccb02509351e95c208fe77460f643fddd38b593836e4bfeae15cfa481d945b8aa45923d7c997e395da432f375fca71ae7359a02d5beaca4e730526a5a86c
-
SSDEEP
12288:3O4rfItL8HPmcBrhRtTDG1iAiPHCorluD7rKxUYXhW:3O4rQtGPmEtTmiHHCoAD3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
54A8.tmppid process 4580 54A8.tmp -
Executes dropped EXE 1 IoCs
Processes:
54A8.tmppid process 4580 54A8.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exedescription pid process target process PID 904 wrote to memory of 4580 904 2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe 54A8.tmp PID 904 wrote to memory of 4580 904 2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe 54A8.tmp PID 904 wrote to memory of 4580 904 2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe 54A8.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\54A8.tmp"C:\Users\Admin\AppData\Local\Temp\54A8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-12_e2aa84af27b29dc9787ceeb16b3b1983_mafia.exe 82C46F22B5D6F2F6E1F202E15C00DA2854C5F144AF95D480321CBA765ED93B901E2AAD63F4DA36A22B12644D5543F0E4AB836E4A170390150082A40F532262692⤵
- Deletes itself
- Executes dropped EXE
PID:4580
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD51d4130b1ec4dc84a5793f91c59adfc9f
SHA13cd4de212be7e37ac6078603d3c5378d798f9d5e
SHA256083aee5e53cc7a02f52c3aa9c3130f2e9e313ca3a9695b02b2b0bd31c148b107
SHA512160cb0d959414c996c8cf31eba8fbd67e5a915f2e225076ff6ede995f4534dd87e34343e21407d15d1432ee42308381f959983cd709772793d3fd6f99983bccb