Analysis
-
max time kernel
139s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_63d651f99fe0af7f6d15f6506bd1279a_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_63d651f99fe0af7f6d15f6506bd1279a_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_63d651f99fe0af7f6d15f6506bd1279a_mafia.exe
-
Size
412KB
-
MD5
63d651f99fe0af7f6d15f6506bd1279a
-
SHA1
02ab3021fc63754b6c6d331eab4968e6846381a0
-
SHA256
4c8d4579fcbba1431a8178905f56ec72aae1bc1d76241c12caee2775dca19b78
-
SHA512
da8fd0c5466a4a6405bf7ec634ad6f1831e963d26df64485bde66f8ec2aea459ec83660018ef696523341462aa02c25dc6a308bb2c49a2a244ab79ea8b110dac
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnia0jJ6/iqVe+Cs8rmakqcdoP:U6PCrIc9kph50jJIVsstc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3788 896.tmp -
Executes dropped EXE 1 IoCs
pid Process 3788 896.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3788 4448 2024-03-28_63d651f99fe0af7f6d15f6506bd1279a_mafia.exe 93 PID 4448 wrote to memory of 3788 4448 2024-03-28_63d651f99fe0af7f6d15f6506bd1279a_mafia.exe 93 PID 4448 wrote to memory of 3788 4448 2024-03-28_63d651f99fe0af7f6d15f6506bd1279a_mafia.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_63d651f99fe0af7f6d15f6506bd1279a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_63d651f99fe0af7f6d15f6506bd1279a_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-28_63d651f99fe0af7f6d15f6506bd1279a_mafia.exe C92EE52F710AFD5373D0470B5ABE738468F5BD89CAC51047FA636DF0DC56666AE4DEC644754EE35915E7BBCADB323FABAE2F8EE49C03FAD3619FA0E8CE48D40F2⤵
- Deletes itself
- Executes dropped EXE
PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1328 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:636
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5fcd441d6b78dbea9542f3da9d8c60f2f
SHA1ec55ecb24f7b71d84d932a01d8b46b1f01d8ace6
SHA2560d0b2ee135ad99fef1e8e58bcaf9b54b7b71c4fcaaa91566ae1458d68b055225
SHA51205e6d3e36c9675930720c34a6239677d375192622dd2ff593f6d79b0bd7a95eb4a2289b254c6f06d34a9ed87e68e9a6683c3034b7b754b74763cc9dd9ec999cf