Analysis
-
max time kernel
92s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_56c72c4f99855b668e0c6b3b704066fb_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_56c72c4f99855b668e0c6b3b704066fb_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_56c72c4f99855b668e0c6b3b704066fb_mafia.exe
-
Size
486KB
-
MD5
56c72c4f99855b668e0c6b3b704066fb
-
SHA1
e5d64e8fd022cfa10c3732264c018171a502ace2
-
SHA256
777fc94611a201c2a4935e5b21e4a36652540d8c0e557bfbb61e3ffbc2de320e
-
SHA512
ea05f0f648d591cd88e03c7c942b5e0132a0eb3cf9bc78eaa0225a3282be6b913bb2c8583e09c17d9186c305d3a8dc25a1d06f1fd3f9c3ff734e1a714c48c7be
-
SSDEEP
12288:3O4rfItL8HPShf8G32VddeOms5OAXGR7rKxUYXhW:3O4rQtGPy27nmoXGR3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2420 5014.tmp -
Executes dropped EXE 1 IoCs
pid Process 2420 5014.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 208 wrote to memory of 2420 208 2024-02-23_56c72c4f99855b668e0c6b3b704066fb_mafia.exe 90 PID 208 wrote to memory of 2420 208 2024-02-23_56c72c4f99855b668e0c6b3b704066fb_mafia.exe 90 PID 208 wrote to memory of 2420 208 2024-02-23_56c72c4f99855b668e0c6b3b704066fb_mafia.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_56c72c4f99855b668e0c6b3b704066fb_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_56c72c4f99855b668e0c6b3b704066fb_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\5014.tmp"C:\Users\Admin\AppData\Local\Temp\5014.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-23_56c72c4f99855b668e0c6b3b704066fb_mafia.exe 6DA2EB57484817A0225108C0CD74DF12337CA4D36DC8E6A0D92522CE67AF1B883E72CA1C63A60F827D9392DBCAECE5D2A42B46D1A9F45E36965DC02F0C05BE5C2⤵
- Deletes itself
- Executes dropped EXE
PID:2420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5321dfb72eeecfe4f467ab4da16024e93
SHA15b1db4ac9da8ae701818e22055ccae291180a06d
SHA256a8d30a4127b320272b87ecaf5963e5a059784402544a02ac110ee216e3c6d210
SHA51298662e19d2616bdb05f6abe99196a7cf9134173b9b2f6018e45df650122f1492c5deee27415db81380085a64deef3cbd282f8f7cca26abf77d3363db03dac41c