Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe
-
Size
413KB
-
MD5
de409ff45551039fcf0e3236f86f0b1c
-
SHA1
7f9c54a1e1ff1f023e2dea93556f7b76a75cf792
-
SHA256
9e5fe9d2ea3d0f8682e3b728c378eb9b46e968ae7913ff4d5c1ad0d079cf2282
-
SHA512
a8a101ee93aa26f4ff4c72e5a4c526f622cd2bf4d8bb10d1801a6dad0eaf422ae1991e9631dd2613455522d8f4a485058fc5a93afa7e3ae27679783d2c8052fb
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFFKGVIKO1cez0D/KwIsNLCoqHg:gZLolhNVyEYIV1co0D/DzWoqHg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4952 C786.tmp -
Executes dropped EXE 1 IoCs
pid Process 4952 C786.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2768 wrote to memory of 4952 2768 2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe 90 PID 2768 wrote to memory of 4952 2768 2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe 90 PID 2768 wrote to memory of 4952 2768 2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\C786.tmp"C:\Users\Admin\AppData\Local\Temp\C786.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe 4E499EB4418478769728206DD443FC4D02FC2593BDB5EAE3323C36543E97EA68EDB9FF91FB0B7E1D7F83EB2FA9B0ED298963930159740C49672D82D99B2839B92⤵
- Deletes itself
- Executes dropped EXE
PID:4952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD51481b6c198a6ace286709b447c9b6820
SHA1af211bfffbd79f5b397c5a485d90a6e9edb77cdf
SHA256faae9e225ebf2a6cb4d3c84a4060ad1219185140b0c94080f02c7653dff789c0
SHA512f3af559aaf0f4fa50bba9327ec26e8479badb7b4cbec9b65f6ee898baa3c4eaf5dc6aecaa753481a9769d0b51be6b0fadd8b3a1d093f84c03df5136290816d48