Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/02/2024, 03:28

General

  • Target

    2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe

  • Size

    486KB

  • MD5

    2957402a7d5c3548a74ad2ffdb84f7c6

  • SHA1

    fa6deda283af78874ad5502d3e98403abd711e4b

  • SHA256

    db39bfb5ade0a5ab32ee1f9884c07affb281acca6b577416713a6dd60a463e7f

  • SHA512

    eb4f213e002414083fe8a0e080c5f4c3b63bd43c4c88605bb3b5755393f419bb756a96d7d003429ef63a33356e25defcfab85447ca84dc0ce256352f465ee8c1

  • SSDEEP

    12288:3O4rfItL8HPTKCTYYZf2ZhBrRU1oOqDt7rKxUYXhW:3O4rQtGPTDTvZfShXOu3KxUYXhW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\2E72.tmp
      "C:\Users\Admin\AppData\Local\Temp\2E72.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe 27EE43E2209E9B4B46995F65BF28D2FB4426E20E6EE85BC115517816DFBD577ED5A8A9708701AAEA7810FCD95B476BC5D4EB76D3724BA986EBAEC74CC9C0163B
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2E72.tmp

    Filesize

    486KB

    MD5

    ac6df70e38b124702e30f4fd4e4dda62

    SHA1

    7648639272923cd16266a3c446ab2e63c24a1ed4

    SHA256

    13fda179ed0e05658f9d787d45b7c2444c4f7dd821e44288e6d937d5fb09f11a

    SHA512

    48266f5e1063c04f92072c46149e68decc8b1a146738417e4298642ff1534686eddcdc93c6a6d79e90233be15077e76b0e6ff263e809f27e9deeb9eee830f640