Analysis
-
max time kernel
135s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_d023d2a62cc87f89a9baf1af4e2b2934_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-12_d023d2a62cc87f89a9baf1af4e2b2934_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_d023d2a62cc87f89a9baf1af4e2b2934_mafia.exe
-
Size
479KB
-
MD5
d023d2a62cc87f89a9baf1af4e2b2934
-
SHA1
45b44bab20ba7ddc4b52cfdde85578263027564d
-
SHA256
0a7a1ab4e06994c2974db1ab00ec07c93fd0447254d5af6039700e60ad8bcda4
-
SHA512
a61b986543f15f1a873ed1b8031db6e5c83b889d1aaac8fb21038f5945bb4ba37669ed1bf04e95e5dcff87a4592f02b57364c6e2cdf792b03c28e058fc5b6094
-
SSDEEP
12288:bO4rfItL8HASF7Ufz+VVhv32XnipwVZaQMAyd75UO:bO4rQtGASufyjhO3i+ZzydVUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 31BE.tmp -
Executes dropped EXE 1 IoCs
pid Process 2604 31BE.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 764 wrote to memory of 2604 764 2024-03-12_d023d2a62cc87f89a9baf1af4e2b2934_mafia.exe 89 PID 764 wrote to memory of 2604 764 2024-03-12_d023d2a62cc87f89a9baf1af4e2b2934_mafia.exe 89 PID 764 wrote to memory of 2604 764 2024-03-12_d023d2a62cc87f89a9baf1af4e2b2934_mafia.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_d023d2a62cc87f89a9baf1af4e2b2934_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_d023d2a62cc87f89a9baf1af4e2b2934_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\31BE.tmp"C:\Users\Admin\AppData\Local\Temp\31BE.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-12_d023d2a62cc87f89a9baf1af4e2b2934_mafia.exe F5115A7B2B66A7B3134FF1E9A4D3828DADB236B3BAF42187291FEF21B239386207FC80D8557D84E5848DDC73FC18F869191DFFBA4F12D90E5986AB13810626FA2⤵
- Deletes itself
- Executes dropped EXE
PID:2604
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD58758984257e19e527cfcc8d0b2c7bb51
SHA1e718f7001ab38bcbe5d3991e0db59791ecabbf5f
SHA25632e44f0abb756a4787fca4697c04143e88571f5991d818e23a7d961d7a2db9f9
SHA512007006f2814d7cd2d487d3513c9645ba6488732555fe21ff1e512cad487a92f8bacecc1be5b283ad8c1a6181484df16f8b9f84cee28778551f3d722134af3eea