Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_7dae6ea9cca41b3c21c75a4d9b4f14e2_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_7dae6ea9cca41b3c21c75a4d9b4f14e2_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_7dae6ea9cca41b3c21c75a4d9b4f14e2_mafia.exe
-
Size
412KB
-
MD5
7dae6ea9cca41b3c21c75a4d9b4f14e2
-
SHA1
dac131d5a979a8eb7a7524374bbe0f9d912f40a4
-
SHA256
7cec20ad006aa94af5d6e2b293ddac4ca51d7840f42f7ca21e324b977e4c60e1
-
SHA512
31460672b23ec247bf2951dc16d7222fd42b9fb3a332ac658e6aea105c76063c89eb83f7d3422e40102c320a1d2974738c4e4773148ecc44ce9d34286f425e41
-
SSDEEP
12288:U6PCrIc9kph5z++LOo++XY+sBHJrcafm:U6QIcOh5zv+kY+sBpr1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3460 319F.tmp -
Executes dropped EXE 1 IoCs
pid Process 3460 319F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3176 wrote to memory of 3460 3176 2024-03-28_7dae6ea9cca41b3c21c75a4d9b4f14e2_mafia.exe 85 PID 3176 wrote to memory of 3460 3176 2024-03-28_7dae6ea9cca41b3c21c75a4d9b4f14e2_mafia.exe 85 PID 3176 wrote to memory of 3460 3176 2024-03-28_7dae6ea9cca41b3c21c75a4d9b4f14e2_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_7dae6ea9cca41b3c21c75a4d9b4f14e2_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_7dae6ea9cca41b3c21c75a4d9b4f14e2_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\319F.tmp"C:\Users\Admin\AppData\Local\Temp\319F.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-28_7dae6ea9cca41b3c21c75a4d9b4f14e2_mafia.exe DCDCA88A412124163B1464081C50BDA001A6C11EADC0B67499ADF870C1B28CCA7ADD940D0C239C916444AD3D5094B04106B47FD59937BA7363018893F5D474A42⤵
- Deletes itself
- Executes dropped EXE
PID:3460
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD515158dac2dca0debdea4a091c2ebf450
SHA16844dea4e134e277e1340a11dbf2aac50b6c2d4a
SHA2562651d240b5798e953d7a3dd3fae8b50034c2eafe9147d8be37be506a0fe5b8e2
SHA51269268f3992bcbb8c57641f4e662d4716be0a46da5763d6f036c55de8797359a02fb082fa0ca03dfec7c5b74190564f7f839e2edec9f53721cd568c0d5d110a77