Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 07:04

General

  • Target

    2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe

  • Size

    433KB

  • MD5

    af2705659d3a625a3227293efe746c33

  • SHA1

    fecb7a15a10a4349098a96f1b26f4a3868f1330e

  • SHA256

    54861d46e307f353b253cbf667e52b0eea9d879fd0863f692dde24c38989f524

  • SHA512

    9aa3c20a208fefdaacde5d9b943ab925a039bb357058ccd4c275cfb5c6dd4ef4022270abfce3cd70f1b8332bd1e78ddb70e82f2611c1eb5cf3b00bcc694f2905

  • SSDEEP

    6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvXor0t7hvKPgd6UxpYkjJ1O4JAwGeADnQj01:Ci4g+yU+0pAiv+3Qod6Ux7bl1X4dTn

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\4C6A.tmp
      "C:\Users\Admin\AppData\Local\Temp\4C6A.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-14_af2705659d3a625a3227293efe746c33_mafia.exe 06BB89422F9CE90B79B3DA46506B870C431544845B0776C1C164C0ACC92041A8A92A3B87B4CEC923B3C70E6A10205B05A3FD5E4B7048FFB941F9F98FDEA474C3
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4C6A.tmp

    Filesize

    433KB

    MD5

    ef17c901d8c01099432344a9ec0de07c

    SHA1

    596ec9a6f00c97cec325af7616db529be8f7bd66

    SHA256

    f2120a70b6899b78c2350e2ee0c1423983ba68864b88a30d247394080ac804cb

    SHA512

    a4be3e08d84a35b4d057b09ef86e0a74e5f9d82792eca579da350d965e2b572223fee843cb3b80897a6b580e9ee480555280718b9028f44661ffe8c6f72eccdf