Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 16:35

General

  • Target

    2024-04-21_8a27e527f2a4297f056a976194b5fab2_mafia.exe

  • Size

    441KB

  • MD5

    8a27e527f2a4297f056a976194b5fab2

  • SHA1

    966826994081eaa8f91f19f1db5ae446c157dcce

  • SHA256

    183eae99ade46f9de807ea3b07817deaa7cb5e3bab23af750979532b0747efd4

  • SHA512

    25a461899ff179663331ec8b5df7adc5a401591704a9ef353f9f779165c8c1ae11c54c4dce9937dc4bc6727ce2111b8ddc113bada3fd8f029aee077953b0d56c

  • SSDEEP

    6144:6ajdz4s4mDHq9OXpOd0p6Jiv+vtvL3wLgrWPEyYlAH1bRAjs5A4rslxZD0HjroAx:6i4ET7+0pAiv+AgrW8MQ41rDU8l+Nc

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-21_8a27e527f2a4297f056a976194b5fab2_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-21_8a27e527f2a4297f056a976194b5fab2_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\2CFB.tmp
      "C:\Users\Admin\AppData\Local\Temp\2CFB.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-21_8a27e527f2a4297f056a976194b5fab2_mafia.exe 9FDB2C564D08C3F098DFEAAAADB371C3B5993C897BF7C9E99813C7AF863EFD321847121E6A3724FC49F4A8FBD3E761FA88D5E1416061C8BF717670330F166DC4
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2220

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2CFB.tmp

          Filesize

          441KB

          MD5

          aabbb74bc96ba6cb89302c4ca587c03f

          SHA1

          edeeace016864ad4b8a5420b3d81277668efcb38

          SHA256

          d1e51dc54cb300b689747caf9f4636d4f3e3a7f7bc64b237480d6a4d32438715

          SHA512

          1e662b16eadac8a14b24e37e4ade7a084866987d7f539623a9c22feb368a194499ff392e6ad3f5e4a0d942be58bead6427c8f98bbf7f8cb002790f425c1876e4

        • memory/2220-5-0x0000000000D90000-0x0000000000E07000-memory.dmp

          Filesize

          476KB

        • memory/2220-7-0x0000000000D90000-0x0000000000E07000-memory.dmp

          Filesize

          476KB

        • memory/4460-0-0x0000000000F60000-0x0000000000FD7000-memory.dmp

          Filesize

          476KB

        • memory/4460-6-0x0000000000F60000-0x0000000000FD7000-memory.dmp

          Filesize

          476KB