Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2024 10:22

General

  • Target

    2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe

  • Size

    433KB

  • MD5

    121981235d8d7c26627299a952768ac9

  • SHA1

    0c42cbae60a93262896966749d5eabe7c13dbbd0

  • SHA256

    ff3095dc2214b7f8b84ca4af9567d0f4f72d968910a682363fb01d3eeee84275

  • SHA512

    f441cf6119f3e9098f94c71288486a0247219fffa4508245c41a1406fe75d0fe35cb814f6876307b31c09a41571efd8941584e81c4a9af98de3c638f7eac3a76

  • SSDEEP

    6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvqjilI1u82jnLW9dNV+2CigrABXXkFBM/n:Ci4g+yU+0pAiv+W1u8HE2JgrqXkQ/n

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Users\Admin\AppData\Local\Temp\7D0F.tmp
      "C:\Users\Admin\AppData\Local\Temp\7D0F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-19_121981235d8d7c26627299a952768ac9_mafia.exe D1D75A745CFC5B5B007D597425EA58C12A5C5E1053D2F5B92EC8549F20A6E2497E3D3CFC7DB473DC12007BEF6B0F857219516DCF8F88873C593712E706F76E8E
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7D0F.tmp

    Filesize

    433KB

    MD5

    7d2e7472585259cb4dda603f08b53425

    SHA1

    fe17a2e7439d56083635ad24e8a61ab5e4a23d2f

    SHA256

    e40be8d82193c161324478ff46fbafe10c23e7b234e5543f47bcd604c7815a81

    SHA512

    8b65ec653e67a284440dfef216ad2a431a99c4d25b75940be7e67f76d02ea38207054fc7c18544604666e111c3b1e3917dfbcbd31b4e61acf8c343e36cee9465