Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_6e626cb6c2f83f9410a03f8e94e26d08_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-06_6e626cb6c2f83f9410a03f8e94e26d08_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-06_6e626cb6c2f83f9410a03f8e94e26d08_mafia.exe
-
Size
468KB
-
MD5
6e626cb6c2f83f9410a03f8e94e26d08
-
SHA1
6576e18804e319250182a17a3213e55557f4ced7
-
SHA256
d2d1134fba8030e1b24b483d7919591354eef2c9a35de4fdf89671167915f5f5
-
SHA512
c8de24b511d3e5191e25081700c4e3b762df97255aaa30b147db41598b94382ee004f18980f0f14f8eb4654cf60fc02f280b6065f356bee724633735c03a0986
-
SSDEEP
12288:qO4rfItL8HGeVlZ8NPca3x0+LyJBAY7bWmeEVGL:qO4rQtGGe5/a3u+L2BLumeEVGL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4988 3299.tmp -
Executes dropped EXE 1 IoCs
pid Process 4988 3299.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3676 wrote to memory of 4988 3676 2024-04-06_6e626cb6c2f83f9410a03f8e94e26d08_mafia.exe 86 PID 3676 wrote to memory of 4988 3676 2024-04-06_6e626cb6c2f83f9410a03f8e94e26d08_mafia.exe 86 PID 3676 wrote to memory of 4988 3676 2024-04-06_6e626cb6c2f83f9410a03f8e94e26d08_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-06_6e626cb6c2f83f9410a03f8e94e26d08_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-06_6e626cb6c2f83f9410a03f8e94e26d08_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\3299.tmp"C:\Users\Admin\AppData\Local\Temp\3299.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-06_6e626cb6c2f83f9410a03f8e94e26d08_mafia.exe A9FCCED3AD1D5D19978CB6C7CB749871FE76C7F68534C95F0524EB86F155DEE3724751E37B57FC2321B3942FBA727995CB5552DA57CD0ABC9AB38B9AAB2AFD062⤵
- Deletes itself
- Executes dropped EXE
PID:4988
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5cec8994439a1bad5abc4f8a3f148a8f2
SHA11da316a7b732ce333eb8fe32565fc34dce6962d0
SHA256b661618a45428ed20bcd25be5842446780e985ffaa2d25cab504074c0c7761c2
SHA51265514d1393e111c873ee4e181ca6cf0c6b6abddfa92cbe60086cda7ede51683ac343e4f713f83ea878a18e24232e4853c0099db0ce5e18a619ad4f8887219a45