Analysis
-
max time kernel
92s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 17:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exe
-
Size
414KB
-
MD5
fabaad76edd1d20c5e45a4a65d368f2c
-
SHA1
31db2f9dcf33b6f8a62a279f60ebdbec1cedb19e
-
SHA256
79daf930f7e2466f2d4c61a82f7a878463d57caee04aa5d8bb8fa34a9dbcd025
-
SHA512
592d6a32e464d723b33398c59e354208d6b2f31a8bab60beb2d258f43d350d1ea1eba64b70d90fe682dc44207e700bbb211a1949afbbde207b1510267343e6e5
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYO1pNniYyz1gOlPTdrkpa0cvspM9l8iNRl:Wq4w/ekieZgU651pNy7bwa0wspMkol
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
644.tmppid process 1020 644.tmp -
Executes dropped EXE 1 IoCs
Processes:
644.tmppid process 1020 644.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exedescription pid process target process PID 4148 wrote to memory of 1020 4148 2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exe 644.tmp PID 4148 wrote to memory of 1020 4148 2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exe 644.tmp PID 4148 wrote to memory of 1020 4148 2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exe 644.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\644.tmp"C:\Users\Admin\AppData\Local\Temp\644.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-12_fabaad76edd1d20c5e45a4a65d368f2c_mafia.exe B6CFF4A37C55FD0EFC6349DCA365D518D5AF30ECA53A99030800BDA7DAD4B41ECD25EDBA64C7DDD5070AD83453BA8E3B3BB15A3A30E7D5C723CB4B1B9EC49FD02⤵
- Deletes itself
- Executes dropped EXE
PID:1020
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD55acbe8a788013777d03a5f4c79a75a8c
SHA1b0381bd2f1934dc28c46355be04f26e9a3612f11
SHA256389e8a9dffd3ff75fda383baf3dd2d3d673fd861c7c627f89d0e1daa6567eb1d
SHA512d4a83f52a1e9c6752f08cdc6b5e465b38d7cd631a328e0366d0126dc7964a5a530af6e149c47651037648f26ae925a13654135763b3d6a94c6bd0d6e15724726