Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe
-
Size
412KB
-
MD5
5bbaa4f10de58b3890f0c6d5ec970f52
-
SHA1
ba2e68d088ddc9c223afe550e303c80b6b7f25fb
-
SHA256
27d0f7d4e185ef7e03159a6dd933c5aff5ec7a39816433631152fc0c3f5cf040
-
SHA512
23dbf80b8366dacc8f852f3df84d5d046aa5a5e0fd8916a9ed135fff764324a1ee6f67e29920eb8c6fa2e8a295a62a6c0ca2d528e1ad7847aefc37db63489ac3
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnRsIaEqrtS3qk9qofXozw4VzFjRPIDhMCP:U6PCrIc9kph5ehDkHPoFTIFh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 6002.tmp -
Executes dropped EXE 1 IoCs
pid Process 2824 6002.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2824 4604 2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe 87 PID 4604 wrote to memory of 2824 4604 2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe 87 PID 4604 wrote to memory of 2824 4604 2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\6002.tmp"C:\Users\Admin\AppData\Local\Temp\6002.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe 5FDB7D778BE8A9091BDEEB76F0148AC92FBCAB61F06755A729441889F5FF5CFEFE6513C8940CF449BD70A951D7ADE5A48CE56276F0395580B93E5F7BAFCBB3692⤵
- Deletes itself
- Executes dropped EXE
PID:2824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5db067de5d560203e8330d1c712239c77
SHA15d9675d7b4ce9ab1ffca0f312245b3ba1b0382ad
SHA2564a33c154d171ca9922637b3fe14e72525d6f6a18f2b94c7f515cefb15e5df81b
SHA5122f698fb6adfe8cfc7396ac29271d47a56b19a83f08d30bdedc37b4e36fb6ba1c757d76e4a704cfcb44c5fe3dea8b5ea63a5719ceaef56b1a7e8768dd0f2e8244