Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_99cca9efd743803121becd3adadf3cb3_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_99cca9efd743803121becd3adadf3cb3_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_99cca9efd743803121becd3adadf3cb3_mafia.exe
-
Size
443KB
-
MD5
99cca9efd743803121becd3adadf3cb3
-
SHA1
fb8bedeee95d45c0c3af940782ada1ee0b8063ff
-
SHA256
ada239128de81a117db755967040ecb00d045b8b257980d8141a5ef71732e9f6
-
SHA512
2694101eeeedc75b85f0274dd25e0b03a94856165d72adb9401d3460040b42df80c63e82975ab9f694e0cee6b9d2fd3ec1cef29d2d84e3d9dbbee8ede881aa79
-
SSDEEP
12288:Wq4w/ekieZgU6Dg+Cw+4qcj27g+aEelMa:Wq4w/ekieH682qcCEzP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4544 57A5.tmp -
Executes dropped EXE 1 IoCs
pid Process 4544 57A5.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4228 wrote to memory of 4544 4228 2024-03-15_99cca9efd743803121becd3adadf3cb3_mafia.exe 88 PID 4228 wrote to memory of 4544 4228 2024-03-15_99cca9efd743803121becd3adadf3cb3_mafia.exe 88 PID 4228 wrote to memory of 4544 4228 2024-03-15_99cca9efd743803121becd3adadf3cb3_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_99cca9efd743803121becd3adadf3cb3_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_99cca9efd743803121becd3adadf3cb3_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\57A5.tmp"C:\Users\Admin\AppData\Local\Temp\57A5.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-15_99cca9efd743803121becd3adadf3cb3_mafia.exe F40D72AD18489FF910944A93C5873AD6E3752FEB71CDD32ECA757D85C3912C6503957B1CA146ABDE6CF9C23C84C095EF9F4167C1F9FFEBB2FA8D99FC89ACF23D2⤵
- Deletes itself
- Executes dropped EXE
PID:4544
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD54bba2940131c09659d7dc1bc0280d303
SHA1b205169dd2e1dcbd9cdb2c66d3577e8ddb39958a
SHA2561e5ac1c03ae8607dc666b8961d43917b454fe49bec392f6a69199855c42f953e
SHA512a4c1dde00818f44e76932ad628aa4be5f877040eb18600f13b5bfb93b89dc9e734acdda8a1ecab5007a2330efe23358c9d18aada6c232542d9ed9d89694713d8