Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2023, 13:08

General

  • Target

    700d5d5544647369c77816989579dc55_mafia_JC.exe

  • Size

    412KB

  • MD5

    700d5d5544647369c77816989579dc55

  • SHA1

    f3b138e48e635afdcbc4ade28b209b7339e76129

  • SHA256

    bb2add91540dee429f9449f6b50a2a030f770abc277d24102cb7a745e1159a8a

  • SHA512

    faf82dff065eb3ba126371a6861cf745ecb3270ecc54be4a2e9a41845a6e879658d00fbde271fb7da9cc6aeec3078392b6cb00bc58ec87ad3493cd91b92fe134

  • SSDEEP

    6144:UooTAQjKG3wDGAeIc9kphIoDZnAe+RD6GT1PwIeeYo2dEqTXp59AO5P:U6PCrIc9kph5S5pT1PANdEq559pJ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\700d5d5544647369c77816989579dc55_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\700d5d5544647369c77816989579dc55_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Users\Admin\AppData\Local\Temp\690F.tmp
      "C:\Users\Admin\AppData\Local\Temp\690F.tmp" --pingC:\Users\Admin\AppData\Local\Temp\700d5d5544647369c77816989579dc55_mafia_JC.exe CBFD798C1177030779EDD2524AD3692545C098DE8553817FB7843EAFE09C53CE76E940447A39DE6D96B8F83A0299F4DE8EDC21FAD8493BBF85B016123B6FDB4B
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2924

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\690F.tmp

    Filesize

    412KB

    MD5

    bf916101c1d13f91eb1e25d39bffa8a4

    SHA1

    e6b90aaf79b4a563716273343156ea3645147c94

    SHA256

    356a7fa44844a105361fa1a8c66e17077ccee5d9b45bf15f641de45a253144c1

    SHA512

    ee33a58996f0222f362c38f07762fc9c558bef3b6c977b2aa9e08d53cfdf78381cf4adf9c66cd2af8780fae2368ff114d4ff8f14e6ff3596a0244182936107a5

  • \Users\Admin\AppData\Local\Temp\690F.tmp

    Filesize

    412KB

    MD5

    bf916101c1d13f91eb1e25d39bffa8a4

    SHA1

    e6b90aaf79b4a563716273343156ea3645147c94

    SHA256

    356a7fa44844a105361fa1a8c66e17077ccee5d9b45bf15f641de45a253144c1

    SHA512

    ee33a58996f0222f362c38f07762fc9c558bef3b6c977b2aa9e08d53cfdf78381cf4adf9c66cd2af8780fae2368ff114d4ff8f14e6ff3596a0244182936107a5