Analysis

  • max time kernel
    138s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 05:37

General

  • Target

    2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe

  • Size

    473KB

  • MD5

    0519b79d46313670367d7d3e627dbaba

  • SHA1

    6852935e027abdd28670e22573b7098349463c39

  • SHA256

    c37ed325c06d6164b7bf3b951f88785175abc3b52f4ca7f5b71675c9e41cea3d

  • SHA512

    398585760ceda793a71510bb08eec035eff670543b1e8e771e8246b5daeba5b76987549bf6abeafcbda94a4fae862061fa8e86ca171669ce27b9a53c2008ef03

  • SSDEEP

    6144:fFrJxvldL4c5ONK1xgWbd1s79+iStuBKQdmamtlqNmTx8G1d1iDPsTVDMTZGQcAi:Nb4bZudi79LjxWtlqN21PijTURwrFA0a

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\4391.tmp
      "C:\Users\Admin\AppData\Local\Temp\4391.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-01_0519b79d46313670367d7d3e627dbaba_mafia.exe 9CA82E32E0487A456213CF5B332AD63AD1DFDAC0FEB0A95981E710A42F870952EC22D54093FD7CD69C6C0040A4D51B874ED87D8FA713BF47A17177FD78426AB3
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:608

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4391.tmp

    Filesize

    41KB

    MD5

    89c6845a9922d4a30cc27b673c79e02d

    SHA1

    d662280e3580f62c6b0d1618e007a6d71f17e1f6

    SHA256

    6f9ca97a489ccbd7505129b98e4eb9a05a2012fa020f8ad0158df0499745fc4c

    SHA512

    36caadb32e0f43ef8c92cb31f0f45569943182e78916fecf3f44803b499cea823aea0b42874cc038cecb1fcdc8a7dbb5189f8e11d0d75b3cbf3a257be3aaab2c

  • C:\Users\Admin\AppData\Local\Temp\4391.tmp

    Filesize

    44KB

    MD5

    c90e6ae3d10d201d1ff2b0a21450b4a0

    SHA1

    5825dbd51d6dc37988f7357bdb970a8d83f85d07

    SHA256

    90f02d2529c05c9d464ca4d92743a96d97b44572c8033ad2696e846a584ef248

    SHA512

    7549082e716146e5aab30b75f4bbe7f31414fd26e0ec3cf0d82a406a1868d467c95c5f2356566b312622d739a3d28b34cf80729dcf9c9a4f5854bf4dbdfc0463