Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe
-
Size
412KB
-
MD5
8e2f862feacc19df5824a98dbdc31e95
-
SHA1
cd8832a23db93b044638899b625450c57562d77c
-
SHA256
3157599de3414c0a9b2d0fb380bc326a3b7b97d2ee6f2ccf9fb58ec90a2491ce
-
SHA512
5ca1d81dfbbba3e11354dd93b957dfe3969b32523fab920d41e468dd8658e27b98f7b39d9a7a877ebaf5a8ce819041f45d06cddff558ea11f4934cc60abe6535
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZn71DjUN5zreUfsKMKoor7gIOrBSluRP:U6PCrIc9kph5TjUb/eUfzf75dlo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 2B07.tmp -
Executes dropped EXE 1 IoCs
pid Process 2308 2B07.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2308 2632 2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 85 PID 2632 wrote to memory of 2308 2632 2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 85 PID 2632 wrote to memory of 2308 2632 2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\2B07.tmp"C:\Users\Admin\AppData\Local\Temp\2B07.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 3F581F9843F28B42ADCC8D39CA465887629C437ABD2C151FF306CFFFE557BAC2A8B7622E5F049581716C5D81D207B7C43EEA0C44EFBD338AEF2086FE7A4B35652⤵
- Deletes itself
- Executes dropped EXE
PID:2308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5e7811499dce6ab2d400d0b399ff20a20
SHA1f8b267cbef4cb3d0b307672871f237a32bb486a3
SHA256aa583527042c18ee02a06b903c8614f5c4ec5472554ef99f4b6bfb2150d12389
SHA5120207e059da3f521436cd7959af014241a97515b76ecb0501b040bf97e3f4c012bf0c5bac6dbc141eeb6f46eacb29620bda45a02d90bdd4dc72b905151eb925e7