Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe
-
Size
428KB
-
MD5
7d46a9cd942289886cbeb0a5d7075857
-
SHA1
649447964032978a23743fc2262331804c7347ef
-
SHA256
623a06b7e2da8b6c16d995a0c8354215f1ff86b22d78e4aca6ad2bf330732951
-
SHA512
a50576b7f92b1a1caccbaa152f10fcd96b686dec1a0eba586c5eaa674376b6a00e296df27f5d1bc599117174c7d43d230b68b8d2ab71befdb38a360ac4da9d9a
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFMS3zXFKcEpPaTMrvqs80bjy8tq7z8tqHR:gZLolhNVyEr0qPxvdyqC8tqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4476 4C4B.tmp -
Executes dropped EXE 1 IoCs
pid Process 4476 4C4B.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3212 wrote to memory of 4476 3212 2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe 86 PID 3212 wrote to memory of 4476 3212 2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe 86 PID 3212 wrote to memory of 4476 3212 2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\4C4B.tmp"C:\Users\Admin\AppData\Local\Temp\4C4B.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe 098B8F41789C37A372343F4E6E012A1A848E840758DF708127974EA2E9F2B120C4378C4FD35177E5D7D8A10FF284E15C814D553C360DB3038112A9C05BCEA5B82⤵
- Deletes itself
- Executes dropped EXE
PID:4476
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5c152a07def97ed1490131ffc8ecaa743
SHA1c54b856e3c7a191b059586dbc63b05a0951afbf9
SHA256c0307ebe2f5e8ea2b0bc7d0a207f68ba07f06683f95abf4f582cfe4996b9277e
SHA51281571c0431c2ed1c60212486d51946a75f5f92813029add62896ee883d1e8ea74ce4f80d68903dbfd108bedf65ea7fadc65ce565b7c47e1aa0eecb8059b5fe6a