Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-03-2024 04:46

General

  • Target

    2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe

  • Size

    384KB

  • MD5

    42586da29e2800d72636a9ab94829310

  • SHA1

    492949ae7cbe9f97f81497bb6a4e5f11ababdf1b

  • SHA256

    d6afcb007616e0384e20f21ab9b690efbab4beb186ac2168d08f5f7102021911

  • SHA512

    664ee2fec4f975707a2593056b8b1849487bb100800fd90f8c7891a0e334afbdb0d29a3c91717d6ed54d499d2e9a13d6eb031c96d363d81a04877fb41abf2aab

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hHaKkUIqnYUbsvxl9Up4IC9wy42sZa0OWaXZ:Zm48gODxbzgKkPqYrvnOC79RT6aXZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Users\Admin\AppData\Local\Temp\4F68.tmp
      "C:\Users\Admin\AppData\Local\Temp\4F68.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-06_42586da29e2800d72636a9ab94829310_mafia.exe 89F0AE364DF55AD95C22F1D6502BF8EBC2B48730107C8277766C892D17B2BF3A8F2E973FD7D5A5FD6123BE6DA4E7A6ED0B8BEE6F00833803207A515AB747554D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4F68.tmp

    Filesize

    384KB

    MD5

    d05b6eaa2cc1109b572b44573004d1b1

    SHA1

    7c884df5a4f96bd49806d5cc67bb3a2287971344

    SHA256

    4355ffd8478f1440b41be4b6ef5fc9215e59e0fa819468b87fc2382c97af2d02

    SHA512

    c6da8700008fc6a3ee54feab821036cd6481852651520d80af72c8c37c8fe7647661a20d2d8b51d9602e9ca878dd1c11fe1cffa40f35ec5e2277ef6423540e98