Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15/08/2023, 16:41

General

  • Target

    f8ef1c8d6a9ef18a80ebc3e065026624_mafia_JC.exe

  • Size

    414KB

  • MD5

    f8ef1c8d6a9ef18a80ebc3e065026624

  • SHA1

    3f58f2727211474131c24bb760a248ddb639e6c5

  • SHA256

    f89f1164c3f1bf6e2470cb68716debdb1a65c3d79b2b408cedcb7b51c0d7d3e3

  • SHA512

    4064d07710b5eef6f11a54c36afe933611e09fc24ad7df56adad6e483e5906ccf1f39dbd914580adf75523dd44f4ebec18bb8db10effc29697a6cb7a26fea9fd

  • SSDEEP

    12288:Wq4w/ekieZgU6HNnMlvMosNp6yxxgqUZxl:Wq4w/ekieH6HeBu+4+qUZx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8ef1c8d6a9ef18a80ebc3e065026624_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\f8ef1c8d6a9ef18a80ebc3e065026624_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\849B.tmp
      "C:\Users\Admin\AppData\Local\Temp\849B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\f8ef1c8d6a9ef18a80ebc3e065026624_mafia_JC.exe 130EA012660DC79B834E60354C1315EF10C0363DB89E1326DEE85E8EC539F6BFCF511BBF8908BB8386317173346E1A8FBDE05DB5FCA54227D4AB14723A92F398
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1896

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\849B.tmp

          Filesize

          414KB

          MD5

          e820575c9e5920ef83159b2d79b52a84

          SHA1

          c7b5c261c511c2d0c3de65288e2443b9b8dcb4d7

          SHA256

          08f41b7c22fcc6c9a2e8ed293f674381e5f445fc06adbb627af07f0a19ced1b2

          SHA512

          da947e9fed2bdf490055c9a6675348e554babb9dc6009fbefa9dd277b651036f39c34b1be2f014d3d59ea5b8d0c084923f196670dbaacf55b838207080ae75aa

        • \Users\Admin\AppData\Local\Temp\849B.tmp

          Filesize

          414KB

          MD5

          e820575c9e5920ef83159b2d79b52a84

          SHA1

          c7b5c261c511c2d0c3de65288e2443b9b8dcb4d7

          SHA256

          08f41b7c22fcc6c9a2e8ed293f674381e5f445fc06adbb627af07f0a19ced1b2

          SHA512

          da947e9fed2bdf490055c9a6675348e554babb9dc6009fbefa9dd277b651036f39c34b1be2f014d3d59ea5b8d0c084923f196670dbaacf55b838207080ae75aa