Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 02:44

General

  • Target

    2024-04-15_cd2c997091d887e177438b99b97002c2_mafia.exe

  • Size

    433KB

  • MD5

    cd2c997091d887e177438b99b97002c2

  • SHA1

    a662d0059c759a9134489371e8b0dc12e13e0d9e

  • SHA256

    d05e002e1e17050e9ff110d0b8a35bd62a0c76a15695338fa274b5132cab185f

  • SHA512

    912774be24961c1217f6fec232d98930172b62c08baf5594534bf971bacb76f1ba0f5be7a74d3ac16f16249504e9257f80494669a04d4785475ad170c07ab009

  • SSDEEP

    12288:Ci4g+yU+0pAiv+4WVGX/rlfw4xfBNjsxvJl5n:Ci4gXn0pD+4/rJ4xDh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_cd2c997091d887e177438b99b97002c2_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_cd2c997091d887e177438b99b97002c2_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Users\Admin\AppData\Local\Temp\3671.tmp
      "C:\Users\Admin\AppData\Local\Temp\3671.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-15_cd2c997091d887e177438b99b97002c2_mafia.exe 5FF435C8DB74E978BED26756DBE35966E58DD318F35725D34238547F27958C7F75699DC729F8781DA8A8D0D84B69CE1A23AB302C46904026C939D921C0A0BD23
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1976

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3671.tmp

    Filesize

    433KB

    MD5

    931cda49dd3aa2cc2eb3849a9c3132f6

    SHA1

    866b8231a0fdb0535e2c45f27dc9442d9e7c4480

    SHA256

    de0acbe6ff9f770becbdc11610ecf6c5283bf5aabf7b602bf65fbc77e3684d86

    SHA512

    1d8bac28997730671fdf8677cfb8a71cb468495b6bae8147559724d5d408d7a6d7da0fcbd570a69390c2ee937be96e9bb7bbfd36ffee5b4ad341638daa9e77b4