Analysis
-
max time kernel
91s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_079ec8ad6df9defdc6a33086669c4049_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_079ec8ad6df9defdc6a33086669c4049_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_079ec8ad6df9defdc6a33086669c4049_mafia.exe
-
Size
479KB
-
MD5
079ec8ad6df9defdc6a33086669c4049
-
SHA1
e3bf798643effb8c2e7659827e336fc99604cf21
-
SHA256
601ed933d729b3313c9e898eb584f5950bf9b7618d09f3cdfa3ab7319feb4460
-
SHA512
c591395dd3a7674e4e482913432e6aee103a8cefb5ff4c0684c298d8236b7dfdae6eafefbdbdb765e180672b2497697cf7cfea8f4143e285a17b27702d50e417
-
SSDEEP
12288:bO4rfItL8HAmc2EPus0iZ1iF6g2MymOC2DeL75UO:bO4rQtGAmc2EPL0kv97AVUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4700 3299.tmp -
Executes dropped EXE 1 IoCs
pid Process 4700 3299.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2388 wrote to memory of 4700 2388 2024-02-24_079ec8ad6df9defdc6a33086669c4049_mafia.exe 86 PID 2388 wrote to memory of 4700 2388 2024-02-24_079ec8ad6df9defdc6a33086669c4049_mafia.exe 86 PID 2388 wrote to memory of 4700 2388 2024-02-24_079ec8ad6df9defdc6a33086669c4049_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_079ec8ad6df9defdc6a33086669c4049_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_079ec8ad6df9defdc6a33086669c4049_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\3299.tmp"C:\Users\Admin\AppData\Local\Temp\3299.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-24_079ec8ad6df9defdc6a33086669c4049_mafia.exe D596A9B6E02085E60ECAD4BC67B2045F660C5700F2D8DFBF40F7745E3DF51914D19CF2B85BA6BD236D750BE31AA88D213C3D42DA0EA72D73C9D67E5B747152B22⤵
- Deletes itself
- Executes dropped EXE
PID:4700
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD59bb501b65f799c5c9738538d2e3fa950
SHA1a30336394334e9d947734edb2c4b6714bf7c26d2
SHA2566cb45e2ab6cf4d54d15c82d9491a57a634f2bdaa96394aaaf5cc7cb052326634
SHA51210418f99e7d248ebbc41a57d8d413ef347387a8d8626b2d2cda46af4465a323ee6fe13f408f517a70cb7661b4d0984ca08145e7266075af35b05663e4655e324