Analysis

  • max time kernel
    104s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 16:44

General

  • Target

    2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe

  • Size

    412KB

  • MD5

    9f592438791a1f06c1ded0401ce85e02

  • SHA1

    ea16dec138f942c96fc6690c22c01d29e741783e

  • SHA256

    b5a763dbad20c890687b73a2480246e89e261031502c2144d1c003b9165820c7

  • SHA512

    60620baf4c4b615c9a8af458973774858904910891beb6ea1b69628c4d7b779c49336f9a469617ef02bbf5b1aa3c732940f6e84fc2f9a8a045c65f5bab295365

  • SSDEEP

    6144:UooTAQjKG3wDGAeIc9kphIoDZnAMH4I7mLVGdwL/7vnwEHYc1iJP8782nIS5dnBP:U6PCrIc9kph5TwVUwlmPB2nIqdh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\AppData\Local\Temp\3D57.tmp
      "C:\Users\Admin\AppData\Local\Temp\3D57.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-13_9f592438791a1f06c1ded0401ce85e02_mafia.exe 6C8F819763028A548142B79C039E581B32EBE1A185863D6026B6EAB426530F8B173DDB54C3DC8CCE3BD18B0BAA4BA9F4794131DD59775EE67F6AD1281A87D8FA
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3D57.tmp

    Filesize

    412KB

    MD5

    7a2863acea215fb13d8a10222e31e36b

    SHA1

    6db9121b375bb00804f1128d714e2d3184ed4e29

    SHA256

    3c08bcd235daf9fd840d71b6d707a32f0274f5e54218f9cacdea37bd1b4f94e1

    SHA512

    8d86ff81248b766507762deb1b5275a77d32480e7240a56157a11a2ac43156626f2545bc6b4a7a3c608c17c7804d88b5ef290fb2b8ca13a932bccb4ac4cc3ed4