Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2024 20:31

General

  • Target

    2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe

  • Size

    486KB

  • MD5

    57a484fa56711ca16a71b35acc9ca541

  • SHA1

    36d3d32e95d771d0bbc855fa58697cb87bce099b

  • SHA256

    e16a44c4f7bda72988db9154a13aeac29ebf1981ebca8239cdfa76791bf3fde1

  • SHA512

    d8a5affe28239a43e1b0536ebb755a9152068bb89a829f6a9465fe557b08a2189a89abce9ec7dc78f46043bdadb7d4876ca87303b86e38d53d0abdbecad03162

  • SSDEEP

    12288:3O4rfItL8HP7wlkaTGaa/BSYFKl7rKxUYXhW:3O4rQtGP8kb1BSIKl3KxUYXhW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Users\Admin\AppData\Local\Temp\290F.tmp
      "C:\Users\Admin\AppData\Local\Temp\290F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-12_57a484fa56711ca16a71b35acc9ca541_mafia.exe EB96A9C1DBAFB7A7AF20CE95EFDE64F5F509D99FDDFBB844568230DDEEF7285DD909A730E387D92C105702B7D03003D8BA976D2B21641FA2C8F4BD1672A26D8F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:5076
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1432

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\290F.tmp

      Filesize

      486KB

      MD5

      0a88dbf152563095d1f28dd5b3600e11

      SHA1

      40076d89482f8318c5a61b9204167305bc21c1c7

      SHA256

      c7ac8f825b4ea85b1d7c8bfbcd62283222ad7099665b464e630c3ccec041528a

      SHA512

      70d5c4ad66c83659f20f5eaba565ec59de861a11a2d936576daf18343723b6bb5af4525cace62ee5ed3856f1c584258fd6dcad626413af28fc0a0c669da87811