Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 22:51

General

  • Target

    2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe

  • Size

    412KB

  • MD5

    b9c13f0a56789e8040f2f663b9c6a595

  • SHA1

    440c577a675e9b56876ab6d496181584f1f74c96

  • SHA256

    3d8720c5065427c47c7085d7d966424814a5ac24f43f80e52b2e2c71214f716e

  • SHA512

    9e57e29dc8aeaf81f9ee847ba500abd4daafc7ba383ef4436f842d9b0a507238115e687cb23152207d36744e24ff0f7b73fc7e3ccf5ec9a53cc9ef49c1700d2b

  • SSDEEP

    6144:UooTAQjKG3wDGAeIc9kphIoDZnCJboaI7BmWv79ZTki4V/Z7WYMoUttm4XPt6tyP:U6PCrIc9kph5MJUaIV5TMiuREokFGK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\447B.tmp
      "C:\Users\Admin\AppData\Local\Temp\447B.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-19_b9c13f0a56789e8040f2f663b9c6a595_mafia.exe 07468B963EB6D65590BCE25238CABF50DA59CC86A9DDD5B723C54218B87C6D29D6A5CE0F215D02C09EB59F42DC7C5F1C75F1A6568ECCD557B88255B2172A826F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1580

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\447B.tmp

    Filesize

    412KB

    MD5

    9a3d0f9c1eb3df57909c56677373d767

    SHA1

    0319317d97fba058a94f4136925835378883a36f

    SHA256

    22926099f1d6198de2fab28e5bc483b79a30fcb9cf97f96d182dc857f2cb2598

    SHA512

    0fba6e5da225d94669167e68c333ecfe6be96a3d3fde1670ee7f2b4b0569bcdff35874e06a154383c86247a52b98b7cfca4e0ae7761b4b353ea4269507af1aba