Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_5808b7ffe56df0727df453e693ea8656_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_5808b7ffe56df0727df453e693ea8656_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_5808b7ffe56df0727df453e693ea8656_mafia.exe
-
Size
443KB
-
MD5
5808b7ffe56df0727df453e693ea8656
-
SHA1
bda412dfe4bde43ae94a6719e52bcd0195eac477
-
SHA256
ce7ee3c9972a0a20568cc0f6d3cb2809e68ac22ce214684d460f6fead5ba31b5
-
SHA512
e44f1f282f0ea1573146e96c41d5ba5e2e575c527028aea569b100e30a42aa9686976e6499e67d92422b105a05e08a008a5234d7954fa73d6de034e5f60cfade
-
SSDEEP
12288:Wq4w/ekieZgU6yX+GLWx1PhURIOGrNQOfmNGelMa:Wq4w/ekieH6WxEP/qrNGeP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 32A9.tmp -
Executes dropped EXE 1 IoCs
pid Process 2788 32A9.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2788 2944 2024-04-16_5808b7ffe56df0727df453e693ea8656_mafia.exe 83 PID 2944 wrote to memory of 2788 2944 2024-04-16_5808b7ffe56df0727df453e693ea8656_mafia.exe 83 PID 2944 wrote to memory of 2788 2944 2024-04-16_5808b7ffe56df0727df453e693ea8656_mafia.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_5808b7ffe56df0727df453e693ea8656_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_5808b7ffe56df0727df453e693ea8656_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\32A9.tmp"C:\Users\Admin\AppData\Local\Temp\32A9.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-16_5808b7ffe56df0727df453e693ea8656_mafia.exe 0192DDF91680315832841E08EC2188E0367BBF670145DF1EB4636210C77E6B727FE25AF44811A2FE885243E89E5C9E9A5FC8DD63301F3F32F56FBFC54A62CF242⤵
- Deletes itself
- Executes dropped EXE
PID:2788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD558e87a315dc042d10c7bd5da125fc059
SHA1001c693241cadea8b72b0ca8fa897be8ed10d0e0
SHA25607d73deae66283498952b59cecbccf900031b1bc260ab1f835fc3dc0f2434aee
SHA512cb80f5ac48125a2b00fdd546cd69cd54c72f74cc129a32abf65c76777384d7c16470a97019cfbac7886c61adb7f153215cf44215ede636137559938ba0d53dfa