Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2024, 09:42

General

  • Target

    2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe

  • Size

    428KB

  • MD5

    7d46a9cd942289886cbeb0a5d7075857

  • SHA1

    649447964032978a23743fc2262331804c7347ef

  • SHA256

    623a06b7e2da8b6c16d995a0c8354215f1ff86b22d78e4aca6ad2bf330732951

  • SHA512

    a50576b7f92b1a1caccbaa152f10fcd96b686dec1a0eba586c5eaa674376b6a00e296df27f5d1bc599117174c7d43d230b68b8d2ab71befdb38a360ac4da9d9a

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFMS3zXFKcEpPaTMrvqs80bjy8tq7z8tqHR:gZLolhNVyEr0qPxvdyqC8tqHR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3212
    • C:\Users\Admin\AppData\Local\Temp\4C4B.tmp
      "C:\Users\Admin\AppData\Local\Temp\4C4B.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-06_7d46a9cd942289886cbeb0a5d7075857_mafia.exe 098B8F41789C37A372343F4E6E012A1A848E840758DF708127974EA2E9F2B120C4378C4FD35177E5D7D8A10FF284E15C814D553C360DB3038112A9C05BCEA5B8
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4476

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4C4B.tmp

    Filesize

    428KB

    MD5

    c152a07def97ed1490131ffc8ecaa743

    SHA1

    c54b856e3c7a191b059586dbc63b05a0951afbf9

    SHA256

    c0307ebe2f5e8ea2b0bc7d0a207f68ba07f06683f95abf4f582cfe4996b9277e

    SHA512

    81571c0431c2ed1c60212486d51946a75f5f92813029add62896ee883d1e8ea74ce4f80d68903dbfd108bedf65ea7fadc65ce565b7c47e1aa0eecb8059b5fe6a