Analysis

  • max time kernel
    93s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 04:57

General

  • Target

    2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe

  • Size

    412KB

  • MD5

    8e2f862feacc19df5824a98dbdc31e95

  • SHA1

    cd8832a23db93b044638899b625450c57562d77c

  • SHA256

    3157599de3414c0a9b2d0fb380bc326a3b7b97d2ee6f2ccf9fb58ec90a2491ce

  • SHA512

    5ca1d81dfbbba3e11354dd93b957dfe3969b32523fab920d41e468dd8658e27b98f7b39d9a7a877ebaf5a8ce819041f45d06cddff558ea11f4934cc60abe6535

  • SSDEEP

    6144:UooTAQjKG3wDGAeIc9kphIoDZn71DjUN5zreUfsKMKoor7gIOrBSluRP:U6PCrIc9kph5TjUb/eUfzf75dlo

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Users\Admin\AppData\Local\Temp\2B07.tmp
      "C:\Users\Admin\AppData\Local\Temp\2B07.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 3F581F9843F28B42ADCC8D39CA465887629C437ABD2C151FF306CFFFE557BAC2A8B7622E5F049581716C5D81D207B7C43EEA0C44EFBD338AEF2086FE7A4B3565
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2B07.tmp

    Filesize

    412KB

    MD5

    e7811499dce6ab2d400d0b399ff20a20

    SHA1

    f8b267cbef4cb3d0b307672871f237a32bb486a3

    SHA256

    aa583527042c18ee02a06b903c8614f5c4ec5472554ef99f4b6bfb2150d12389

    SHA512

    0207e059da3f521436cd7959af014241a97515b76ecb0501b040bf97e3f4c012bf0c5bac6dbc141eeb6f46eacb29620bda45a02d90bdd4dc72b905151eb925e7