Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe
-
Size
476KB
-
MD5
ff7edbd8863c7382746712c3429cc903
-
SHA1
43559325ac24c1babb39d36c436844dce9d3db3f
-
SHA256
52dcd4b00fb68ac4b4f69edbef59b755be3f02e5e011dd332c2dba4238ce6a28
-
SHA512
8e9d59e22f7ccfd1d250f783dea807779f754a28a73b8c068410d89e167196e9914484f5df7dc5f6c6d239fa5a2bb666deea2d125312def28f31dc5360db9967
-
SSDEEP
12288:aO4rfItL8HRBUfD0NFm5USiTqYO4Jh1s9aHSiFb+YifW7K9wlsDpVFd:aO4rQtGRBiEFmliu9U1wPqiW+9wlsDpN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3172 7714.tmp -
Executes dropped EXE 1 IoCs
pid Process 3172 7714.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4264 wrote to memory of 3172 4264 2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe 84 PID 4264 wrote to memory of 3172 4264 2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe 84 PID 4264 wrote to memory of 3172 4264 2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\7714.tmp"C:\Users\Admin\AppData\Local\Temp\7714.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe 56418F649EEBC06F13AAE0E2155A3AE4FAD7C0AB69D643C8E91D3E5A2AB07533DC7DE9FE11C1ED004CFF9839417EC451D93CD923DE3F6B404D15FE969FB464412⤵
- Deletes itself
- Executes dropped EXE
PID:3172
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5f2453e71d7691103cd437bf70bb7cad4
SHA16ea657709b251e22489174b8da9289e9ce3ca22a
SHA256e0a5e1780a5d81408a45e504cbba48155cf91d96d74f79922df5c2c63efdeb82
SHA512ba652e39cc78cdf2074759f11c01edcd6ba789846b276d06b3a6b2043d3010aa23df28b70ca02c92027a19f9316cd15f9ed66e31dd35226268638194886d45dc