Analysis

  • max time kernel
    141s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 14:39

General

  • Target

    2024-03-09_93d5479d76923a5b0e8b56d5a20b601c_mafia.exe

  • Size

    435KB

  • MD5

    93d5479d76923a5b0e8b56d5a20b601c

  • SHA1

    b1028420c3c6e248523972b66684a45c576e6cac

  • SHA256

    dc0fa8d5ecc0ee89d1ab25911247e92d8882cf960d7eead432cded3763ffbaac

  • SHA512

    3a35d6b32ac275cd74669e285c9d5264a9214a13f7c7895ee92214aa2aa886ea5a6e97056d294f47faf52a9d0e2f29c1f4170109c3467d2b5d0deec23db0258a

  • SSDEEP

    12288:fd4x+ePixnXQjkJcefLKFARoHQpLB4awP:fd4x+ePixAjkJceZIQpLB7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_93d5479d76923a5b0e8b56d5a20b601c_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_93d5479d76923a5b0e8b56d5a20b601c_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\896.tmp
      "C:\Users\Admin\AppData\Local\Temp\896.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-09_93d5479d76923a5b0e8b56d5a20b601c_mafia.exe 1B969541323B2D9A58900CF3C39BC522E7596CB8DDCE012C10A2BF8B4CF253A80D59C0E9CE0D28A2872A594887DCB484C84A864AE7DBD594890A624BE9C277A6
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:228
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1756

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\896.tmp

      Filesize

      435KB

      MD5

      9deed9dfa7a65c76e86046e9b54a0948

      SHA1

      a6143094a2ad6ab6c0fb640ba5fa626b5117ea75

      SHA256

      213710b19320efec9d1fccbefb16bcc322f85b4e87c85db185adcc11546db345

      SHA512

      caf7205bbcd7e2a67a43ead4dab872cd5dd84aa9568dd16230f888804d8de3cb12e7c496f7ac7eee63f79dce1273cbad0d264e7837519e0e2922c067138145f5