Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_2210a5cc4984d6d8c52b3846d9a2a05e_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_2210a5cc4984d6d8c52b3846d9a2a05e_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_2210a5cc4984d6d8c52b3846d9a2a05e_mafia.exe
-
Size
433KB
-
MD5
2210a5cc4984d6d8c52b3846d9a2a05e
-
SHA1
dbe015046a57928b3c3422c5c7c9bf386ff52160
-
SHA256
3b7b7532e19f828da488204f8fa04c15207dfe718e6c17caea35546b8c0b35ff
-
SHA512
47d3284a9699b2c16957633f824b2f13f6e0feaa17a85d4092678da5a8767ab4be7ff08036f2c7969ca5b1b2d969818feb3ccb96827100bb13981dbaaa608bca
-
SSDEEP
6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvTrO9qStGzQetQhS8ggU3WvgJ7NuNPhc/Lm5:Ci4g+yU+0pAiv+4997clNEoDmk4n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 744 4035.tmp -
Executes dropped EXE 1 IoCs
pid Process 744 4035.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4608 wrote to memory of 744 4608 2024-03-05_2210a5cc4984d6d8c52b3846d9a2a05e_mafia.exe 87 PID 4608 wrote to memory of 744 4608 2024-03-05_2210a5cc4984d6d8c52b3846d9a2a05e_mafia.exe 87 PID 4608 wrote to memory of 744 4608 2024-03-05_2210a5cc4984d6d8c52b3846d9a2a05e_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_2210a5cc4984d6d8c52b3846d9a2a05e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_2210a5cc4984d6d8c52b3846d9a2a05e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\4035.tmp"C:\Users\Admin\AppData\Local\Temp\4035.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-05_2210a5cc4984d6d8c52b3846d9a2a05e_mafia.exe AFB95AB43504B1DCC13E9FFCFD7623402FA2320C372F43766C17C37AE7AEC088FAD2EC8951A740816FAE51CDDE7303B8D7A24EE307130745C2A99703B4D793EE2⤵
- Deletes itself
- Executes dropped EXE
PID:744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5c3b395e142be4868d4bd4e8f3f95a012
SHA12c21dc39423a7f189b3edf0117ec51ad88c7a1f3
SHA25600e27271bcf18ca1881210b2b3bfb79c203001643856aa8e5c6e979d4bd960ab
SHA51209982051193d2dc3fddd12c987c40bec32093718681a84c295f24374128223472f07bbf2581f60ea8ac4b3dcdbd70a4fcd10b2856111e9df5181749f14c7b958