Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe
-
Size
384KB
-
MD5
ebaef5d742cbb88cc370adb075f550e2
-
SHA1
d44f57ecfc472f6d085b432129db289897d5b6a9
-
SHA256
2bca2e2796d34b19a30f625a1fedc8e8315dcf9542bba8a35e5b6a48b64aab74
-
SHA512
084acd64fdb0752b557b6a3a23714ab412cfeb2d69aafdc83b2f4e06d0f118d687ec3f789828a1d8d276d1978d7dea2acb4b83dd13c19ed8f023dab49c6ed512
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hHM5T3hMZwh4m0j450pxQUXuw92AxylMCZ:Zm48gODxbz+WwZ5Suw92ftZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2396 7E48.tmp -
Executes dropped EXE 1 IoCs
pid Process 2396 7E48.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 928 wrote to memory of 2396 928 2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe 84 PID 928 wrote to memory of 2396 928 2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe 84 PID 928 wrote to memory of 2396 928 2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\7E48.tmp"C:\Users\Admin\AppData\Local\Temp\7E48.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe 731C7273F04F2A33F78022073DB59FA7B2EE0B5FC07578E877EC9E32CD0EA9A4506B838B8D33BC131D2269CC57EC23B9C03A87DB3A76F3D4B74E388B639475902⤵
- Deletes itself
- Executes dropped EXE
PID:2396
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5bad786370b26a3a679e9757f425e6198
SHA1b7292fb96bf5d13763aae1fb7aff2eb31ab104ea
SHA256db51b7b08790f8a11ec2ed75f0e8b321943b961814f80246d79f30d21615e830
SHA51247547984e64092e117e5d0e5b9b923dca0b1b4787d2d5bed3f2f80d69bf76df991db0a60f87f4eb775dac586fc7eec94ccec832e8ac1a6e937f4833b94af8a43