Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe
Resource
win10v2004-20240319-en
General
-
Target
2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe
-
Size
411KB
-
MD5
97e1762b4df813b8ddfdebf032c8b855
-
SHA1
ef414a425a1284d38c9142d214e4566608efb3a8
-
SHA256
1fa5c1c87fde8bb22b66119700bae759850610211613467da38b6edbeca52549
-
SHA512
67303d6bdc59b74ac0e45f24fc336f22ea87a601d78d5a2987f3341a84ab4829101f3145be71e2495497d5a5a49a7479273937d4175262868f2edf05d86ddd9d
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFkvXCbug5EdHMYshEEcau+2NRbvpPJVqHI:gZLolhNVyEDyoMHhbu+ylJVqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3752 803C.tmp -
Executes dropped EXE 1 IoCs
pid Process 3752 803C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4328 wrote to memory of 3752 4328 2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe 93 PID 4328 wrote to memory of 3752 4328 2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe 93 PID 4328 wrote to memory of 3752 4328 2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\803C.tmp"C:\Users\Admin\AppData\Local\Temp\803C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe 0C87F4EE947091D5F4C679DF4EA6BE971CA53BB01C8931C57A97F256A396D924823B4F4C430DB84FF452037DD7E141B79FE1D60E1603C198E01C2F562CA7E8BC2⤵
- Deletes itself
- Executes dropped EXE
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2148,i,1752153415760610784,11376271161549019716,262144 --variations-seed-version /prefetch:81⤵PID:4020
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5c0917ff009c6c8e7bcf3a9a130b319b0
SHA1854ded390739030deff38f3e2bc5c0d72ffbe0b9
SHA256a41a8e55f6ad3c23ae10f14f149c21f4e58b2da1c0019a6c880e1bbb0fef8d57
SHA5129a9c5a0a1dc153acb804c198bf265101d6cabdccb770797d9294e85fab8f1e13bd2e1db7b197b6ddc7bb9a21e05cd100ea6008fc3580e8705ac75fcb54bd7490