Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe
-
Size
411KB
-
MD5
b944b9e67a8b62655edf3ef7f07a268c
-
SHA1
5d97d4ee8c2c08801c17b656cf087dbe00679ad1
-
SHA256
df256e9595658d6248a820bf3001ab9e01b81ca1136663bab324f7e9932e98c4
-
SHA512
e4a3ebe250a0699751cff4e5feea3acf1de0eb8b5023c96aafb0ed35f4506e80b51dd5947a19dec0b30de10dc8aede9b8538eb54e2eb4b1a5aed26e9db85d39a
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFUTXPyy7W1OHZBfmNjeM8PSE6l/qeOV3QkbMOMaqo:gZLolhNVyEnzPTBfmVYqXoeOV31qHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1092 7DFA.tmp -
Executes dropped EXE 1 IoCs
pid Process 1092 7DFA.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 1092 4528 2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe 84 PID 4528 wrote to memory of 1092 4528 2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe 84 PID 4528 wrote to memory of 1092 4528 2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\7DFA.tmp"C:\Users\Admin\AppData\Local\Temp\7DFA.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe AACBCA03D4D90C4A7EA598F44E787E1354464F28846297B893AE2DE67FAAFB2515F7A38A0C0F7CB9776199C178D6AC6697FA8E70ED2A6307828002C39263FF8C2⤵
- Deletes itself
- Executes dropped EXE
PID:1092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD51d4c3594a6d964bd52d4b0a7116ca627
SHA1d1839f779f6a7b5233e551b338484b7ec734f2bf
SHA256f3e373951e4246a36f3c024ea131424894a095cfb16edeae7fd29c3fe6a1b16f
SHA5129ccd8a57021d4b77be5912e83a108698788143839305daf97b3fe583a6771c8027d498e47d8bb6c9d6c1d4106b661c985889e81206e43013581e8361f94e6909