Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_cbd1d3599f808843f271bc61965c46f6_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_cbd1d3599f808843f271bc61965c46f6_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_cbd1d3599f808843f271bc61965c46f6_mafia.exe
-
Size
479KB
-
MD5
cbd1d3599f808843f271bc61965c46f6
-
SHA1
400fa40b56b90416e06d4636860f1d2945a2988f
-
SHA256
f700c565c108136cc06f4952a78e8e1c5555d277829ccc7eff77f45fcf36c788
-
SHA512
38a39ca9d3c9df412f5c00338dfad4ae05cc08d4c2af5e41e9f1b1cb6a884b3c66ca1c31e5105a40b7fee3ec441b1999e8ba52ac02af580f3c114c38da599ad1
-
SSDEEP
12288:bO4rfItL8HArOVWBwLrFlwUyBxV/Z/Vi75UO:bO4rQtGAEWJUyBLN0VUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 3BE0.tmp -
Executes dropped EXE 1 IoCs
pid Process 3044 3BE0.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3852 wrote to memory of 3044 3852 2024-02-29_cbd1d3599f808843f271bc61965c46f6_mafia.exe 89 PID 3852 wrote to memory of 3044 3852 2024-02-29_cbd1d3599f808843f271bc61965c46f6_mafia.exe 89 PID 3852 wrote to memory of 3044 3852 2024-02-29_cbd1d3599f808843f271bc61965c46f6_mafia.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_cbd1d3599f808843f271bc61965c46f6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_cbd1d3599f808843f271bc61965c46f6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\3BE0.tmp"C:\Users\Admin\AppData\Local\Temp\3BE0.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-29_cbd1d3599f808843f271bc61965c46f6_mafia.exe C1FBB34DB95D3E62B0B9367FD011A712C86CDC1BE001AF4879C5045803657E7205DF5039B43B481B5167A93AC69D60AB404A4DF51DFBFC64FE41950C481507962⤵
- Deletes itself
- Executes dropped EXE
PID:3044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD53ba6816987b07573fc9c6451f284124a
SHA192e5bbb9f53ba0012e09012fb3d194a5929d69c3
SHA2569cbe7bcca7cf4fd0b2e63d12b01bf3b67215cef247fb4aeda9d3ff4138598850
SHA51201171cb17d8bcfe0833a84400d14bced4f0087ee6f6b4a25463c9baa3704c03deb3e15a0b713b351d426f2d1476ff430820edc52beb3df2021d0f60cfbf6a305