Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-25_a5684da5fb004069a2b821a13f6197c6_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-25_a5684da5fb004069a2b821a13f6197c6_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-25_a5684da5fb004069a2b821a13f6197c6_mafia.exe
-
Size
428KB
-
MD5
a5684da5fb004069a2b821a13f6197c6
-
SHA1
3b9a8a9c2df369fcaf43b386142906e3bc16f726
-
SHA256
c5f4e78ff8add0f4c0636739e863a1461f9f29178e3675dc54388dcbeb1b157b
-
SHA512
e19ce28e9b7f4bed2c8aff3b2507e70dadeb1f75bedeba9b9e5d5e0f60b7d5a63e31b92ff6f681727827701f661f9a902ba541bd045767e28f2b81893f10e23c
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFhUHb8TOxgd3TXpSaiMGWcp2lluFddvmrqHR:gZLolhNVyE/IyxSTga7GWcwaddvYqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2772 687E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2772 687E.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1556 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2772 2568 2024-03-25_a5684da5fb004069a2b821a13f6197c6_mafia.exe 88 PID 2568 wrote to memory of 2772 2568 2024-03-25_a5684da5fb004069a2b821a13f6197c6_mafia.exe 88 PID 2568 wrote to memory of 2772 2568 2024-03-25_a5684da5fb004069a2b821a13f6197c6_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-25_a5684da5fb004069a2b821a13f6197c6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-25_a5684da5fb004069a2b821a13f6197c6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\687E.tmp"C:\Users\Admin\AppData\Local\Temp\687E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-25_a5684da5fb004069a2b821a13f6197c6_mafia.exe C4E660FCFA75188B85E3C4C302111928F4C07D6852F45CF1AF583B725DEF917E7134B55AD28049407ACDE25D6B0427738F3FE3EAF8FF72DCCD42E1B00B83A9202⤵
- Deletes itself
- Executes dropped EXE
PID:2772
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1556
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5ce659a593cc554698d7080aa6300ad4f
SHA1c3bab9492e4c43bea2f9c9bbacfd82c363c69e1b
SHA256f7f3ad6e308ec7f5b403a03e425be11f8bf2f3d347e62f71a00e8aa17305a4d2
SHA51225bf664916bd274ba71e85c92427181bfe43cfb59bcd6a4e0df82ca48d8b484e5ddd295e26d481cd0f6bd7f506fa5cd587622bfbd9bb157305d35ccf8038ad6c
-
Filesize
428KB
MD57a874b4ad47556c099d15ef03a4194a5
SHA17d18b277237c9153d73f14c0a4a4bdff0a8c8afb
SHA256a871a71df19e425bc8ff44cf103085cf32f79aab1842036c746b9f45f631e53b
SHA512c5df5fda04af4fd94b69995942da7c9e6acbea635244cc526c03b0e92c3a121c244946bf1550badc589097c499ccb191bc34728a93cdc19b403c2f8558f3c11a