Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_67d1ae004fae2a93774037f7bd759949_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-02-28_67d1ae004fae2a93774037f7bd759949_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_67d1ae004fae2a93774037f7bd759949_mafia.exe
-
Size
486KB
-
MD5
67d1ae004fae2a93774037f7bd759949
-
SHA1
9f9735a6dc9a84f033e3a5100d5286bf9ce16a20
-
SHA256
25ae2f0e3366ef2e4022f6c6e3d2995f66c711e39df74d5138f0f34709f3c276
-
SHA512
3b7e7f5251990192ffcca4a1dab51490107788ff12c0182894221f5526064278c75ba68ed92252469a78c738ab30dbf67b4ff43ec0de270a619dc95ec7e72e23
-
SSDEEP
12288:3O4rfItL8HPwxkairukg/OFiLU56Gcx7rKxUYXhW:3O4rQtGPw4PAAaK69x3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 467F.tmp -
Executes dropped EXE 1 IoCs
pid Process 2240 467F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 372 wrote to memory of 2240 372 2024-02-28_67d1ae004fae2a93774037f7bd759949_mafia.exe 86 PID 372 wrote to memory of 2240 372 2024-02-28_67d1ae004fae2a93774037f7bd759949_mafia.exe 86 PID 372 wrote to memory of 2240 372 2024-02-28_67d1ae004fae2a93774037f7bd759949_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_67d1ae004fae2a93774037f7bd759949_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_67d1ae004fae2a93774037f7bd759949_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\467F.tmp"C:\Users\Admin\AppData\Local\Temp\467F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-28_67d1ae004fae2a93774037f7bd759949_mafia.exe F10ECB95AC0FECA61D7AC5A52F0B8CF06362C6CC7DC3CECC9C4E69A445157127C93A55000E0725EF74069394F8D0D896078431A8A7A2BBFB3E06E37C8391D7882⤵
- Deletes itself
- Executes dropped EXE
PID:2240
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD54b9f5a7603e6194e7598673ed57caf0b
SHA1d840d6fc89d39eed97edd236e66543b2413f3e99
SHA25648bade13e32caf7d7cb8be6c41beb8e8a932aae5718151e1b18f7bc8edfda921
SHA5120317b5c38deb9026ec5f2bae9d8dc0dd190ac69aa9d5857b044dee74e7c4ad48f689a47f9e2bb8a9200f9cf5c0bdba8e9ca3a2a659d1d5127ec44a0687750ac2
-
Filesize
448KB
MD53ba2c0a85e0520a30cdc46d4cbad75ac
SHA1c703d5023402124734338298e0e03357df76da41
SHA256dfe4d66dd2bb4ff9f7dbd9cf0b060e9e09feb40e3ad9e649faa33ccaf83242b0
SHA512e0598aa266553841c7b32e61b513303d320eabb8a7ef3acd6ac0cf68be1fb3526f1c4628ad7a7807837a751dd82d9e093d4b25ec273f08f09019032f503c2408