Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_74d78bfce82e1ffc8fbbffa2fca751fa_mafia.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-11_74d78bfce82e1ffc8fbbffa2fca751fa_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_74d78bfce82e1ffc8fbbffa2fca751fa_mafia.exe
-
Size
411KB
-
MD5
74d78bfce82e1ffc8fbbffa2fca751fa
-
SHA1
072b3814e2cde94e332317745f95e0987af9042c
-
SHA256
e4726761cd1309d34a1168e2f72671d85faacf25e0de737333b3a289c672b1d9
-
SHA512
a38ce5d07268a5cd6c97f599ddd14468832b1a25134ec37c1b6a90fd52d1f092d89593f06509b96509841e7056a45534b02cf4d9581b0f78276192bc46503ce5
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFpg0q5jWgNzjgl5UwV+NZlShXWJHqHI:gZLolhNVyEUi5jnNzkjw8MJHqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3968 71C5.tmp -
Executes dropped EXE 1 IoCs
pid Process 3968 71C5.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3968 3016 2024-04-11_74d78bfce82e1ffc8fbbffa2fca751fa_mafia.exe 84 PID 3016 wrote to memory of 3968 3016 2024-04-11_74d78bfce82e1ffc8fbbffa2fca751fa_mafia.exe 84 PID 3016 wrote to memory of 3968 3016 2024-04-11_74d78bfce82e1ffc8fbbffa2fca751fa_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_74d78bfce82e1ffc8fbbffa2fca751fa_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-11_74d78bfce82e1ffc8fbbffa2fca751fa_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\71C5.tmp"C:\Users\Admin\AppData\Local\Temp\71C5.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-11_74d78bfce82e1ffc8fbbffa2fca751fa_mafia.exe 59CC7E9CFCBB94342932D8FCE1C08140DB8F24E7C12CBFBDE556DF5EAF6EC88D67638ECCB9C0816FC2DB3A48247C648A33DE5C05480B8AE422290CCB8F50F8392⤵
- Deletes itself
- Executes dropped EXE
PID:3968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD52b3c6720f41106656fec7ee2f75be2d4
SHA18943593b3888b77c8d41787c5ba25bcb701c2a41
SHA25615901ae75b273dd7ce1e98b31d98c9c2283f1c4a1ca84c64c7e516fe8598ee15
SHA512d7ae1903480a56227383d4374a1711065b106ce7112d55dcf2d9ad3be00ecc11680538e3b9066c6c2ea7d2bff1062537b12434937fb23c7e428ede21c12a8830