Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2024 00:42

General

  • Target

    2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe

  • Size

    411KB

  • MD5

    b944b9e67a8b62655edf3ef7f07a268c

  • SHA1

    5d97d4ee8c2c08801c17b656cf087dbe00679ad1

  • SHA256

    df256e9595658d6248a820bf3001ab9e01b81ca1136663bab324f7e9932e98c4

  • SHA512

    e4a3ebe250a0699751cff4e5feea3acf1de0eb8b5023c96aafb0ed35f4506e80b51dd5947a19dec0b30de10dc8aede9b8538eb54e2eb4b1a5aed26e9db85d39a

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFUTXPyy7W1OHZBfmNjeM8PSE6l/qeOV3QkbMOMaqo:gZLolhNVyEnzPTBfmVYqXoeOV31qHI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Users\Admin\AppData\Local\Temp\7DFA.tmp
      "C:\Users\Admin\AppData\Local\Temp\7DFA.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-13_b944b9e67a8b62655edf3ef7f07a268c_mafia.exe AACBCA03D4D90C4A7EA598F44E787E1354464F28846297B893AE2DE67FAAFB2515F7A38A0C0F7CB9776199C178D6AC6697FA8E70ED2A6307828002C39263FF8C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1092

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7DFA.tmp

    Filesize

    411KB

    MD5

    1d4c3594a6d964bd52d4b0a7116ca627

    SHA1

    d1839f779f6a7b5233e551b338484b7ec734f2bf

    SHA256

    f3e373951e4246a36f3c024ea131424894a095cfb16edeae7fd29c3fe6a1b16f

    SHA512

    9ccd8a57021d4b77be5912e83a108698788143839305daf97b3fe583a6771c8027d498e47d8bb6c9d6c1d4106b661c985889e81206e43013581e8361f94e6909