Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_0deb2169bc97aed2bdda33240e880b14_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_0deb2169bc97aed2bdda33240e880b14_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_0deb2169bc97aed2bdda33240e880b14_mafia.exe
-
Size
479KB
-
MD5
0deb2169bc97aed2bdda33240e880b14
-
SHA1
392046bae39db7f0c6997f642a9bdbf8fee9b583
-
SHA256
1d5c50bdceba883812ac42247d3b9b611deb99af3a01e466ecedd7510aebb497
-
SHA512
cb9c792075a7241dd4d85365098a52732ba119ac94d4a8a57dac9e14eec9b50512c54747ec6a2adf3b4818819b03a1d3dfd92f03cd5d3bd38974a9a4015c8fe4
-
SSDEEP
12288:bO4rfItL8HAxPTQVvGydxHoHgXTqJUaUXYdov75UO:bO4rQtGAVT4Ndl4i5VUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4688 6B2D.tmp -
Executes dropped EXE 1 IoCs
pid Process 4688 6B2D.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3508 wrote to memory of 4688 3508 2024-02-19_0deb2169bc97aed2bdda33240e880b14_mafia.exe 84 PID 3508 wrote to memory of 4688 3508 2024-02-19_0deb2169bc97aed2bdda33240e880b14_mafia.exe 84 PID 3508 wrote to memory of 4688 3508 2024-02-19_0deb2169bc97aed2bdda33240e880b14_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_0deb2169bc97aed2bdda33240e880b14_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_0deb2169bc97aed2bdda33240e880b14_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"C:\Users\Admin\AppData\Local\Temp\6B2D.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-19_0deb2169bc97aed2bdda33240e880b14_mafia.exe A87D578A7C63CBC0A2A65CFE867207807E0766B29059681C9F00AB638C52FE9746A959776A654FB006CA7DC9028B67D6D7D81EC3800A812144A1BC62C910CAF32⤵
- Deletes itself
- Executes dropped EXE
PID:4688
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5cebc9896b7243233fea8ffdea91d176d
SHA14a3ce836a2860f2a2f546ee278a4e0d045fb5a65
SHA2563f1174984364e73fef01f650193d14aec05f09116a9222fcd3dda05725a56ea5
SHA5129d3f96966b72f3c1e18073d8a7dff7e3fdaf236825e8d00e3d422fe4dacc5d96511ab3e3dde1001b5c13cd917a0e40d0f704ecbae160c2fc026fc9295035b273