Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_2d87b35b504d90ae11bc2ca3144741d7_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_2d87b35b504d90ae11bc2ca3144741d7_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_2d87b35b504d90ae11bc2ca3144741d7_mafia.exe
-
Size
486KB
-
MD5
2d87b35b504d90ae11bc2ca3144741d7
-
SHA1
f672eec6b0093b390a27d10c6047caeb0c92772f
-
SHA256
bb5d7fc23183e121537441361e723eff801259eb62d13a1d7b4512d206b5b7dd
-
SHA512
5bd59f3bb52a7b22f989c6cb353948d1df177965aa5d157dbe51007d7ef39d4f6fbf1b9842b6c4948580b2ed9b22445ff9ac9e4e677a95d5a7373a4d4d95dcfb
-
SSDEEP
12288:3O4rfItL8HP/u4uKOiBgTy3i7d04KKk7rKxUYXhW:3O4rQtGP75HQk3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4316 61A8.tmp -
Executes dropped EXE 1 IoCs
pid Process 4316 61A8.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4316 3632 2024-04-10_2d87b35b504d90ae11bc2ca3144741d7_mafia.exe 86 PID 3632 wrote to memory of 4316 3632 2024-04-10_2d87b35b504d90ae11bc2ca3144741d7_mafia.exe 86 PID 3632 wrote to memory of 4316 3632 2024-04-10_2d87b35b504d90ae11bc2ca3144741d7_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_2d87b35b504d90ae11bc2ca3144741d7_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_2d87b35b504d90ae11bc2ca3144741d7_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\61A8.tmp"C:\Users\Admin\AppData\Local\Temp\61A8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-10_2d87b35b504d90ae11bc2ca3144741d7_mafia.exe B2E661B5110FDBE0682C2749FCF8ABBA914B7720E885C2B198BBE1DD75A7F76CAEDAE5ED7C924646EEA02AA47C22993059AE673925B0317265A4C32DB036387E2⤵
- Deletes itself
- Executes dropped EXE
PID:4316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5727b09d2b8f68c4db5415e447c03fa85
SHA1632b1ffb8c8a483aaea10d231f5fc99ca6d2875f
SHA256cf88192b64658ac102ed4ec91835c403b02bd6df57925cd45f0d833a7e4bfdd8
SHA512bf02d8683f808391a652200be4d70229734026929a6727f6ea3b50275ce096638fa9cd4db0abfd6f164f283dd98c94bcef608a277c40d284a81c00d8328deece