Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe
-
Size
384KB
-
MD5
42586da29e2800d72636a9ab94829310
-
SHA1
492949ae7cbe9f97f81497bb6a4e5f11ababdf1b
-
SHA256
d6afcb007616e0384e20f21ab9b690efbab4beb186ac2168d08f5f7102021911
-
SHA512
664ee2fec4f975707a2593056b8b1849487bb100800fd90f8c7891a0e334afbdb0d29a3c91717d6ed54d499d2e9a13d6eb031c96d363d81a04877fb41abf2aab
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hHaKkUIqnYUbsvxl9Up4IC9wy42sZa0OWaXZ:Zm48gODxbzgKkPqYrvnOC79RT6aXZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2084 4F68.tmp -
Executes dropped EXE 1 IoCs
pid Process 2084 4F68.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1000 wrote to memory of 2084 1000 2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe 88 PID 1000 wrote to memory of 2084 1000 2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe 88 PID 1000 wrote to memory of 2084 1000 2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\4F68.tmp"C:\Users\Admin\AppData\Local\Temp\4F68.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe 89F0AE364DF55AD95C22F1D6502BF8EBC2B48730107C8277766C892D17B2BF3A8F2E973FD7D5A5FD6123BE6DA4E7A6ED0B8BEE6F00833803207A515AB747554D2⤵
- Deletes itself
- Executes dropped EXE
PID:2084
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5d05b6eaa2cc1109b572b44573004d1b1
SHA17c884df5a4f96bd49806d5cc67bb3a2287971344
SHA2564355ffd8478f1440b41be4b6ef5fc9215e59e0fa819468b87fc2382c97af2d02
SHA512c6da8700008fc6a3ee54feab821036cd6481852651520d80af72c8c37c8fe7647661a20d2d8b51d9602e9ca878dd1c11fe1cffa40f35ec5e2277ef6423540e98