Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_846071ca6ee579ca8584a12562592b46_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-16_846071ca6ee579ca8584a12562592b46_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-16_846071ca6ee579ca8584a12562592b46_mafia.exe
-
Size
412KB
-
MD5
846071ca6ee579ca8584a12562592b46
-
SHA1
443cd6417f69232cbfa2f23e72364be7b966c022
-
SHA256
fc2dfc4002cdb3f5f1494fe244e3e9925c1ce52479c8df2d2e5a7c18586408f5
-
SHA512
263fe053df61aa685252046a15f2529fb97190e11f3d92e84c7462cefe6b344a1436ea7aa91a342545eff9871d12bdf8f43be5d04874faa09ee865e175181174
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnL/0+FCDViixVLb7XebzkvLjgP:U6PCrIc9kph5J/0lxlbybzMj4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4836 5C78.tmp -
Executes dropped EXE 1 IoCs
pid Process 4836 5C78.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4836 4416 2024-03-16_846071ca6ee579ca8584a12562592b46_mafia.exe 89 PID 4416 wrote to memory of 4836 4416 2024-03-16_846071ca6ee579ca8584a12562592b46_mafia.exe 89 PID 4416 wrote to memory of 4836 4416 2024-03-16_846071ca6ee579ca8584a12562592b46_mafia.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-16_846071ca6ee579ca8584a12562592b46_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-16_846071ca6ee579ca8584a12562592b46_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\5C78.tmp"C:\Users\Admin\AppData\Local\Temp\5C78.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-16_846071ca6ee579ca8584a12562592b46_mafia.exe A49A13F3AF2F8419FBC20FB905B1ED544D37761DDBCB0B3FA9F39C40C5D7E4C5FF92D81D4188710F1262BD6E30B97860116EB7918775E97BB9714006F96D5D532⤵
- Deletes itself
- Executes dropped EXE
PID:4836
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5693b731bc8bffa76cd7f9098b525937d
SHA1a9c85255966ebdb62095a8e8b03de2af4fe91e52
SHA256ca7e65776454fe0971c98f73032db78230a86446583cb478575643f821fca985
SHA512bba32c249f0e32ece10adfcd751f9a5e45375f266437df87c8f9833ac2fd058dfac7a610ff77975b4edb372092cf789aea871881bc6cef95b9b254b7fc56ac2d