Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2023, 17:08

General

  • Target

    7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe

  • Size

    1.2MB

  • MD5

    7a9b9f1f294c7b9dc0300d7be856ce91

  • SHA1

    09839b13b355b23341ee3ede17a27d2d93dac9e5

  • SHA256

    2242a74b85a02094e99c1d96494729aedcf84232ba373bbf65be6f8b8208ee2f

  • SHA512

    0526e18f4c67ae549b57913abdf0996b4e8137b225da93253ba25f251f686b884795c07ef53710598aa96572ac01504b38f384356d5c8fba791d0250db148919

  • SSDEEP

    24576:sv1Okt3JTNHwAFgxa/ZGSylS12LOxZCiocoEuZ7mdOHfM0OAw0:sY43JTNQ0gxuGSCj8CiocEpOAz

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\p2enrhde\gui\page_3468_attr_3.png

          Filesize

          10KB

          MD5

          d34103434d594f426447edfa02244bb6

          SHA1

          320e63503f10e70a64cad286e885bc1f9e229da7

          SHA256

          aff1063413d7b4850023e77c50dd455072dc6e44394ac9544e911809c42da3dc

          SHA512

          c3f767030f374f75ffee5536e41f57e507029a97adde1132f9282611e35c32b7d106104548532783f2977c7688a0c60f043c8988bf4037c744edfdb0e63130c5

        • C:\Users\Admin\AppData\Local\Temp\p2enrhde\gui\page_3468_attr_46.bmp

          Filesize

          41KB

          MD5

          19cafe521085d306aa66d256bce120c6

          SHA1

          a41ae63f80dc451fb68a34f64aa86867f2cdbd6e

          SHA256

          ce22b3fa0bb7ad842657737c51a287caea2623019fcefbea4906462f49e31894

          SHA512

          936e0ca8f2accfaba11dc190e89ae3d19e2ba0963824e87c24ab7e1cc006cc7232163c90924a1e93abe7d602b64b4b5543544e114d9059ea56b6f28535c8527d

        • C:\Users\Admin\AppData\Local\Temp\p2enrhde\wizard.xml

          Filesize

          7KB

          MD5

          eb9a484a2e1cb6e2f8cdb0d9c285ea02

          SHA1

          f3c9403e30a7839eb57d3be19cf7d2cd0a5c33c2

          SHA256

          ea52b7d1ec71fdefd2347e0c333657ffcd5de6aa0d5a0e514a521464cd37a03f

          SHA512

          ae0daa8a6bd6df1d3e5b5f935114b605fb6c3b91cc79fba911fd9073295e4187649046a395b48abc009b35c37ddee27e5566472a98370eb4b2a357fa3cf3735e

        • memory/232-0-0x0000000004BA0000-0x0000000004D5B000-memory.dmp

          Filesize

          1.7MB

        • memory/232-89-0x0000000005720000-0x0000000005721000-memory.dmp

          Filesize

          4KB

        • memory/232-105-0x0000000005720000-0x0000000005721000-memory.dmp

          Filesize

          4KB