Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe
-
Size
411KB
-
MD5
8479a43cef11e55daefeceb8a4e365b0
-
SHA1
345ebf227fad7db2c5941bb20d5bbadc5dc6ee5d
-
SHA256
5e99e610e1c511867681327afbb18f1a16a55beb60c106b06e49cd734b5b396d
-
SHA512
ef0988195d7e9fef4a66c00a40182f4e685c7caf8c08236adb93f32f4a2c8935c92d94b21e00faa09768d1e8bbd5077e60587795664cecf8c5cc94cc94c16ac4
-
SSDEEP
12288:gZLolhNVyEpYxhb/tboA+yAYtX5Sw0zKtIHMWqHI:gZqhOE2xVlZAYtIKtOMI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 568C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2516 568C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 2516 4908 2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe 87 PID 4908 wrote to memory of 2516 4908 2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe 87 PID 4908 wrote to memory of 2516 4908 2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\568C.tmp"C:\Users\Admin\AppData\Local\Temp\568C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe 3DC725C71BE0354B9431AB8B396639A4F819D67EA49423567ADC821084FE0C5F5F97DA9195917721BEC4691BB9B2950F52666D53BEB0B9836F78F7D013C2BBFE2⤵
- Deletes itself
- Executes dropped EXE
PID:2516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5b13e60ccbb770cd62209cced5e52c912
SHA1a715fef924e9aa9a39e17f36132e73c22d362dc4
SHA256afe2f6e44a0e330eb51868495163b661e3b0dc8bb0df9d37120f3825108f4ac8
SHA512a379907feebe8e47b8b437822ed1798f405cb78e5b5272353e779891f8b03fa0a4c8f0c0390e4ad0ea5014a16f9bfc30dafcd483c1d8123c940beed1b0bb3b88