Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 06:34

General

  • Target

    2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe

  • Size

    412KB

  • MD5

    5bbaa4f10de58b3890f0c6d5ec970f52

  • SHA1

    ba2e68d088ddc9c223afe550e303c80b6b7f25fb

  • SHA256

    27d0f7d4e185ef7e03159a6dd933c5aff5ec7a39816433631152fc0c3f5cf040

  • SHA512

    23dbf80b8366dacc8f852f3df84d5d046aa5a5e0fd8916a9ed135fff764324a1ee6f67e29920eb8c6fa2e8a295a62a6c0ca2d528e1ad7847aefc37db63489ac3

  • SSDEEP

    6144:UooTAQjKG3wDGAeIc9kphIoDZnRsIaEqrtS3qk9qofXozw4VzFjRPIDhMCP:U6PCrIc9kph5ehDkHPoFTIFh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\6002.tmp
      "C:\Users\Admin\AppData\Local\Temp\6002.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe 5FDB7D778BE8A9091BDEEB76F0148AC92FBCAB61F06755A729441889F5FF5CFEFE6513C8940CF449BD70A951D7ADE5A48CE56276F0395580B93E5F7BAFCBB369
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2824

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6002.tmp

    Filesize

    412KB

    MD5

    db067de5d560203e8330d1c712239c77

    SHA1

    5d9675d7b4ce9ab1ffca0f312245b3ba1b0382ad

    SHA256

    4a33c154d171ca9922637b3fe14e72525d6f6a18f2b94c7f515cefb15e5df81b

    SHA512

    2f698fb6adfe8cfc7396ac29271d47a56b19a83f08d30bdedc37b4e36fb6ba1c757d76e4a704cfcb44c5fe3dea8b5ea63a5719ceaef56b1a7e8768dd0f2e8244