Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe
-
Size
412KB
-
MD5
b9c13f0a56789e8040f2f663b9c6a595
-
SHA1
440c577a675e9b56876ab6d496181584f1f74c96
-
SHA256
3d8720c5065427c47c7085d7d966424814a5ac24f43f80e52b2e2c71214f716e
-
SHA512
9e57e29dc8aeaf81f9ee847ba500abd4daafc7ba383ef4436f842d9b0a507238115e687cb23152207d36744e24ff0f7b73fc7e3ccf5ec9a53cc9ef49c1700d2b
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnCJboaI7BmWv79ZTki4V/Z7WYMoUttm4XPt6tyP:U6PCrIc9kph5MJUaIV5TMiuREokFGK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1580 447B.tmp -
Executes dropped EXE 1 IoCs
pid Process 1580 447B.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1580 1356 2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe 83 PID 1356 wrote to memory of 1580 1356 2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe 83 PID 1356 wrote to memory of 1580 1356 2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\447B.tmp"C:\Users\Admin\AppData\Local\Temp\447B.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe 07468B963EB6D65590BCE25238CABF50DA59CC86A9DDD5B723C54218B87C6D29D6A5CE0F215D02C09EB59F42DC7C5F1C75F1A6568ECCD557B88255B2172A826F2⤵
- Deletes itself
- Executes dropped EXE
PID:1580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD59a3d0f9c1eb3df57909c56677373d767
SHA10319317d97fba058a94f4136925835378883a36f
SHA25622926099f1d6198de2fab28e5bc483b79a30fcb9cf97f96d182dc857f2cb2598
SHA5120fba6e5da225d94669167e68c333ecfe6be96a3d3fde1670ee7f2b4b0569bcdff35874e06a154383c86247a52b98b7cfca4e0ae7761b4b353ea4269507af1aba