Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe
-
Size
486KB
-
MD5
57a484fa56711ca16a71b35acc9ca541
-
SHA1
36d3d32e95d771d0bbc855fa58697cb87bce099b
-
SHA256
e16a44c4f7bda72988db9154a13aeac29ebf1981ebca8239cdfa76791bf3fde1
-
SHA512
d8a5affe28239a43e1b0536ebb755a9152068bb89a829f6a9465fe557b08a2189a89abce9ec7dc78f46043bdadb7d4876ca87303b86e38d53d0abdbecad03162
-
SSDEEP
12288:3O4rfItL8HP7wlkaTGaa/BSYFKl7rKxUYXhW:3O4rQtGP8kb1BSIKl3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5076 290F.tmp -
Executes dropped EXE 1 IoCs
pid Process 5076 290F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 324 wrote to memory of 5076 324 2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe 96 PID 324 wrote to memory of 5076 324 2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe 96 PID 324 wrote to memory of 5076 324 2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\290F.tmp"C:\Users\Admin\AppData\Local\Temp\290F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe EB96A9C1DBAFB7A7AF20CE95EFDE64F5F509D99FDDFBB844568230DDEEF7285DD909A730E387D92C105702B7D03003D8BA976D2B21641FA2C8F4BD1672A26D8F2⤵
- Deletes itself
- Executes dropped EXE
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:1432
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD50a88dbf152563095d1f28dd5b3600e11
SHA140076d89482f8318c5a61b9204167305bc21c1c7
SHA256c7ac8f825b4ea85b1d7c8bfbcd62283222ad7099665b464e630c3ccec041528a
SHA51270d5c4ad66c83659f20f5eaba565ec59de861a11a2d936576daf18343723b6bb5af4525cace62ee5ed3856f1c584258fd6dcad626413af28fc0a0c669da87811