Analysis

  • max time kernel
    140s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 21:45

General

  • Target

    2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe

  • Size

    413KB

  • MD5

    de409ff45551039fcf0e3236f86f0b1c

  • SHA1

    7f9c54a1e1ff1f023e2dea93556f7b76a75cf792

  • SHA256

    9e5fe9d2ea3d0f8682e3b728c378eb9b46e968ae7913ff4d5c1ad0d079cf2282

  • SHA512

    a8a101ee93aa26f4ff4c72e5a4c526f622cd2bf4d8bb10d1801a6dad0eaf422ae1991e9631dd2613455522d8f4a485058fc5a93afa7e3ae27679783d2c8052fb

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFFKGVIKO1cez0D/KwIsNLCoqHg:gZLolhNVyEYIV1co0D/DzWoqHg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Users\Admin\AppData\Local\Temp\C786.tmp
      "C:\Users\Admin\AppData\Local\Temp\C786.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-23_de409ff45551039fcf0e3236f86f0b1c_mafia.exe 4E499EB4418478769728206DD443FC4D02FC2593BDB5EAE3323C36543E97EA68EDB9FF91FB0B7E1D7F83EB2FA9B0ED298963930159740C49672D82D99B2839B9
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4952

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\C786.tmp

          Filesize

          413KB

          MD5

          1481b6c198a6ace286709b447c9b6820

          SHA1

          af211bfffbd79f5b397c5a485d90a6e9edb77cdf

          SHA256

          faae9e225ebf2a6cb4d3c84a4060ad1219185140b0c94080f02c7653dff789c0

          SHA512

          f3af559aaf0f4fa50bba9327ec26e8479badb7b4cbec9b65f6ee898baa3c4eaf5dc6aecaa753481a9769d0b51be6b0fadd8b3a1d093f84c03df5136290816d48