Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe
-
Size
433KB
-
MD5
af2705659d3a625a3227293efe746c33
-
SHA1
fecb7a15a10a4349098a96f1b26f4a3868f1330e
-
SHA256
54861d46e307f353b253cbf667e52b0eea9d879fd0863f692dde24c38989f524
-
SHA512
9aa3c20a208fefdaacde5d9b943ab925a039bb357058ccd4c275cfb5c6dd4ef4022270abfce3cd70f1b8332bd1e78ddb70e82f2611c1eb5cf3b00bcc694f2905
-
SSDEEP
6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvXor0t7hvKPgd6UxpYkjJ1O4JAwGeADnQj01:Ci4g+yU+0pAiv+3Qod6Ux7bl1X4dTn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3248 4C6A.tmp -
Executes dropped EXE 1 IoCs
pid Process 3248 4C6A.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3248 2908 2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe 85 PID 2908 wrote to memory of 3248 2908 2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe 85 PID 2908 wrote to memory of 3248 2908 2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\4C6A.tmp"C:\Users\Admin\AppData\Local\Temp\4C6A.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe 06BB89422F9CE90B79B3DA46506B870C431544845B0776C1C164C0ACC92041A8A92A3B87B4CEC923B3C70E6A10205B05A3FD5E4B7048FFB941F9F98FDEA474C32⤵
- Deletes itself
- Executes dropped EXE
PID:3248
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5ef17c901d8c01099432344a9ec0de07c
SHA1596ec9a6f00c97cec325af7616db529be8f7bd66
SHA256f2120a70b6899b78c2350e2ee0c1423983ba68864b88a30d247394080ac804cb
SHA512a4be3e08d84a35b4d057b09ef86e0a74e5f9d82792eca579da350d965e2b572223fee843cb3b80897a6b580e9ee480555280718b9028f44661ffe8c6f72eccdf