Analysis
-
max time kernel
104s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe
-
Size
412KB
-
MD5
9f592438791a1f06c1ded0401ce85e02
-
SHA1
ea16dec138f942c96fc6690c22c01d29e741783e
-
SHA256
b5a763dbad20c890687b73a2480246e89e261031502c2144d1c003b9165820c7
-
SHA512
60620baf4c4b615c9a8af458973774858904910891beb6ea1b69628c4d7b779c49336f9a469617ef02bbf5b1aa3c732940f6e84fc2f9a8a045c65f5bab295365
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnAMH4I7mLVGdwL/7vnwEHYc1iJP8782nIS5dnBP:U6PCrIc9kph5TwVUwlmPB2nIqdh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3244 3D57.tmp -
Executes dropped EXE 1 IoCs
pid Process 3244 3D57.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3244 4960 2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 84 PID 4960 wrote to memory of 3244 4960 2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 84 PID 4960 wrote to memory of 3244 4960 2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\3D57.tmp"C:\Users\Admin\AppData\Local\Temp\3D57.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 6C8F819763028A548142B79C039E581B32EBE1A185863D6026B6EAB426530F8B173DDB54C3DC8CCE3BD18B0BAA4BA9F4794131DD59775EE67F6AD1281A87D8FA2⤵
- Deletes itself
- Executes dropped EXE
PID:3244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD57a2863acea215fb13d8a10222e31e36b
SHA16db9121b375bb00804f1128d714e2d3184ed4e29
SHA2563c08bcd235daf9fd840d71b6d707a32f0274f5e54218f9cacdea37bd1b4f94e1
SHA5128d86ff81248b766507762deb1b5275a77d32480e7240a56157a11a2ac43156626f2545bc6b4a7a3c608c17c7804d88b5ef290fb2b8ca13a932bccb4ac4cc3ed4