Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-02-2024 11:51

General

  • Target

    2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe

  • Size

    384KB

  • MD5

    ebaef5d742cbb88cc370adb075f550e2

  • SHA1

    d44f57ecfc472f6d085b432129db289897d5b6a9

  • SHA256

    2bca2e2796d34b19a30f625a1fedc8e8315dcf9542bba8a35e5b6a48b64aab74

  • SHA512

    084acd64fdb0752b557b6a3a23714ab412cfeb2d69aafdc83b2f4e06d0f118d687ec3f789828a1d8d276d1978d7dea2acb4b83dd13c19ed8f023dab49c6ed512

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hHM5T3hMZwh4m0j450pxQUXuw92AxylMCZ:Zm48gODxbz+WwZ5Suw92ftZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Users\Admin\AppData\Local\Temp\7E48.tmp
      "C:\Users\Admin\AppData\Local\Temp\7E48.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-21_ebaef5d742cbb88cc370adb075f550e2_mafia.exe 731C7273F04F2A33F78022073DB59FA7B2EE0B5FC07578E877EC9E32CD0EA9A4506B838B8D33BC131D2269CC57EC23B9C03A87DB3A76F3D4B74E388B63947590
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2396

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7E48.tmp

    Filesize

    384KB

    MD5

    bad786370b26a3a679e9757f425e6198

    SHA1

    b7292fb96bf5d13763aae1fb7aff2eb31ab104ea

    SHA256

    db51b7b08790f8a11ec2ed75f0e8b321943b961814f80246d79f30d21615e830

    SHA512

    47547984e64092e117e5d0e5b9b923dca0b1b4787d2d5bed3f2f80d69bf76df991db0a60f87f4eb775dac586fc7eec94ccec832e8ac1a6e937f4833b94af8a43