Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe
-
Size
486KB
-
MD5
2957402a7d5c3548a74ad2ffdb84f7c6
-
SHA1
fa6deda283af78874ad5502d3e98403abd711e4b
-
SHA256
db39bfb5ade0a5ab32ee1f9884c07affb281acca6b577416713a6dd60a463e7f
-
SHA512
eb4f213e002414083fe8a0e080c5f4c3b63bd43c4c88605bb3b5755393f419bb756a96d7d003429ef63a33356e25defcfab85447ca84dc0ce256352f465ee8c1
-
SSDEEP
12288:3O4rfItL8HPTKCTYYZf2ZhBrRU1oOqDt7rKxUYXhW:3O4rQtGPTDTvZfShXOu3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2624 2E72.tmp -
Executes dropped EXE 1 IoCs
pid Process 2624 2E72.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2624 3012 2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe 90 PID 3012 wrote to memory of 2624 3012 2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe 90 PID 3012 wrote to memory of 2624 3012 2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\2E72.tmp"C:\Users\Admin\AppData\Local\Temp\2E72.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe 27EE43E2209E9B4B46995F65BF28D2FB4426E20E6EE85BC115517816DFBD577ED5A8A9708701AAEA7810FCD95B476BC5D4EB76D3724BA986EBAEC74CC9C0163B2⤵
- Deletes itself
- Executes dropped EXE
PID:2624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5ac6df70e38b124702e30f4fd4e4dda62
SHA17648639272923cd16266a3c446ab2e63c24a1ed4
SHA25613fda179ed0e05658f9d787d45b7c2444c4f7dd821e44288e6d937d5fb09f11a
SHA51248266f5e1063c04f92072c46149e68decc8b1a146738417e4298642ff1534686eddcdc93c6a6d79e90233be15077e76b0e6ff263e809f27e9deeb9eee830f640