Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_e5ec94838d88a6c26ecc7aaaeb60460d_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_e5ec94838d88a6c26ecc7aaaeb60460d_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_e5ec94838d88a6c26ecc7aaaeb60460d_mafia.exe
-
Size
479KB
-
MD5
e5ec94838d88a6c26ecc7aaaeb60460d
-
SHA1
d894b00be919389c40ffa071a22e02c88cbe2481
-
SHA256
cf38fecd1ce1068090f0491b28dd174842e3c1d1413ee7a199d13558ba9559ab
-
SHA512
9ff4f36fe1d1efbe3155a535d7084d212914210985171ae5181f2287b9f96387f1daaa1bb32cb4fcf79432a8de2e2d278a6eb70a7b46b07a8497fdbf6e5b3686
-
SSDEEP
12288:bO4rfItL8HAyVGR0upSkytjH+wh8L75UO:bO4rQtGAyVu0u9ojH+wh8LVUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1644 3C9B.tmp -
Executes dropped EXE 1 IoCs
pid Process 1644 3C9B.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 1644 4584 2024-02-28_e5ec94838d88a6c26ecc7aaaeb60460d_mafia.exe 87 PID 4584 wrote to memory of 1644 4584 2024-02-28_e5ec94838d88a6c26ecc7aaaeb60460d_mafia.exe 87 PID 4584 wrote to memory of 1644 4584 2024-02-28_e5ec94838d88a6c26ecc7aaaeb60460d_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_e5ec94838d88a6c26ecc7aaaeb60460d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_e5ec94838d88a6c26ecc7aaaeb60460d_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\3C9B.tmp"C:\Users\Admin\AppData\Local\Temp\3C9B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-28_e5ec94838d88a6c26ecc7aaaeb60460d_mafia.exe 528CFBEC3C0507CCE2F12559B440FAF9D27FD66B8BD00D3023DDF96710AB584BE2DFEF3F1E1D452B57DAAC8BA9CC57BEDEA72FC85F6B1C678B1268D3C5EAD3052⤵
- Deletes itself
- Executes dropped EXE
PID:1644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5823c9261cd889a7515f70fa3443ace92
SHA120ea780a25353ea21f9d2e279343a6483d7eb1f0
SHA2561f0e4d512cb4c99b4906bbb013e08d062f3c4a73e62016204b9ea9d22599f92f
SHA5126b67d761955465bf170e07bcbf2ab70e7e586398659d93ecaf1e42bd532fb5b459dbaf082e8cfb08c3df76677a68fb76ec4540d00e1e3731b826689350556798