Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe
-
Size
433KB
-
MD5
121981235d8d7c26627299a952768ac9
-
SHA1
0c42cbae60a93262896966749d5eabe7c13dbbd0
-
SHA256
ff3095dc2214b7f8b84ca4af9567d0f4f72d968910a682363fb01d3eeee84275
-
SHA512
f441cf6119f3e9098f94c71288486a0247219fffa4508245c41a1406fe75d0fe35cb814f6876307b31c09a41571efd8941584e81c4a9af98de3c638f7eac3a76
-
SSDEEP
6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvqjilI1u82jnLW9dNV+2CigrABXXkFBM/n:Ci4g+yU+0pAiv+W1u8HE2JgrqXkQ/n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 964 7D0F.tmp -
Executes dropped EXE 1 IoCs
pid Process 964 7D0F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3684 wrote to memory of 964 3684 2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe 84 PID 3684 wrote to memory of 964 3684 2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe 84 PID 3684 wrote to memory of 964 3684 2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\7D0F.tmp"C:\Users\Admin\AppData\Local\Temp\7D0F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe D1D75A745CFC5B5B007D597425EA58C12A5C5E1053D2F5B92EC8549F20A6E2497E3D3CFC7DB473DC12007BEF6B0F857219516DCF8F88873C593712E706F76E8E2⤵
- Deletes itself
- Executes dropped EXE
PID:964
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD57d2e7472585259cb4dda603f08b53425
SHA1fe17a2e7439d56083635ad24e8a61ab5e4a23d2f
SHA256e40be8d82193c161324478ff46fbafe10c23e7b234e5543f47bcd604c7815a81
SHA5128b65ec653e67a284440dfef216ad2a431a99c4d25b75940be7e67f76d02ea38207054fc7c18544604666e111c3b1e3917dfbcbd31b4e61acf8c343e36cee9465