Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 20:40

General

  • Target

    2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe

  • Size

    411KB

  • MD5

    97e1762b4df813b8ddfdebf032c8b855

  • SHA1

    ef414a425a1284d38c9142d214e4566608efb3a8

  • SHA256

    1fa5c1c87fde8bb22b66119700bae759850610211613467da38b6edbeca52549

  • SHA512

    67303d6bdc59b74ac0e45f24fc336f22ea87a601d78d5a2987f3341a84ab4829101f3145be71e2495497d5a5a49a7479273937d4175262868f2edf05d86ddd9d

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFkvXCbug5EdHMYshEEcau+2NRbvpPJVqHI:gZLolhNVyEDyoMHhbu+ylJVqHI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4328
    • C:\Users\Admin\AppData\Local\Temp\803C.tmp
      "C:\Users\Admin\AppData\Local\Temp\803C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-27_97e1762b4df813b8ddfdebf032c8b855_mafia.exe 0C87F4EE947091D5F4C679DF4EA6BE971CA53BB01C8931C57A97F256A396D924823B4F4C430DB84FF452037DD7E141B79FE1D60E1603C198E01C2F562CA7E8BC
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3752
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2148,i,1752153415760610784,11376271161549019716,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4020

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\803C.tmp

      Filesize

      411KB

      MD5

      c0917ff009c6c8e7bcf3a9a130b319b0

      SHA1

      854ded390739030deff38f3e2bc5c0d72ffbe0b9

      SHA256

      a41a8e55f6ad3c23ae10f14f149c21f4e58b2da1c0019a6c880e1bbb0fef8d57

      SHA512

      9a9c5a0a1dc153acb804c198bf265101d6cabdccb770797d9294e85fab8f1e13bd2e1db7b197b6ddc7bb9a21e05cd100ea6008fc3580e8705ac75fcb54bd7490