Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 14:33

General

  • Target

    2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe

  • Size

    411KB

  • MD5

    8479a43cef11e55daefeceb8a4e365b0

  • SHA1

    345ebf227fad7db2c5941bb20d5bbadc5dc6ee5d

  • SHA256

    5e99e610e1c511867681327afbb18f1a16a55beb60c106b06e49cd734b5b396d

  • SHA512

    ef0988195d7e9fef4a66c00a40182f4e685c7caf8c08236adb93f32f4a2c8935c92d94b21e00faa09768d1e8bbd5077e60587795664cecf8c5cc94cc94c16ac4

  • SSDEEP

    12288:gZLolhNVyEpYxhb/tboA+yAYtX5Sw0zKtIHMWqHI:gZqhOE2xVlZAYtIKtOMI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\568C.tmp
      "C:\Users\Admin\AppData\Local\Temp\568C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-21_8479a43cef11e55daefeceb8a4e365b0_mafia.exe 3DC725C71BE0354B9431AB8B396639A4F819D67EA49423567ADC821084FE0C5F5F97DA9195917721BEC4691BB9B2950F52666D53BEB0B9836F78F7D013C2BBFE
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2516

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\568C.tmp

    Filesize

    411KB

    MD5

    b13e60ccbb770cd62209cced5e52c912

    SHA1

    a715fef924e9aa9a39e17f36132e73c22d362dc4

    SHA256

    afe2f6e44a0e330eb51868495163b661e3b0dc8bb0df9d37120f3825108f4ac8

    SHA512

    a379907feebe8e47b8b437822ed1798f405cb78e5b5272353e779891f8b03fa0a4c8f0c0390e4ad0ea5014a16f9bfc30dafcd483c1d8123c940beed1b0bb3b88