Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2023, 13:36

General

  • Target

    a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe

  • Size

    414KB

  • MD5

    a22e08a30412f782e34fbdba6530c4d8

  • SHA1

    cc787d8157fa6c8a054cc06edf43d84d259deaa5

  • SHA256

    14c01b6147acef473607a74d6c7905f03e53423e5d5b3bec47a17b6b6b2e4e32

  • SHA512

    8384312a01850d776086644dc51b8f0106d830d7ff5b6952f741c1a701c6f69dee8d6ba5a2878072e19bfd19aa53b51edaab2b031991fd9986979ddf82e86381

  • SSDEEP

    12288:Wq4w/ekieZgU6qnJDPWZvN1FW295CXKal:Wq4w/ekieH6eBUv3P0aa

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\7F3E.tmp
      "C:\Users\Admin\AppData\Local\Temp\7F3E.tmp" --helpC:\Users\Admin\AppData\Local\Temp\a22e08a30412f782e34fbdba6530c4d8_mafia_JC.exe A0AACAA5345C52425275EEE4F0AD879598D87CEEE36B2E4706CD1E16A479AAC0DCE76D7A060B078917E7BFE2E40DF5F294334E1B4B7E539F6C57E8A709F1474E
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1624

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7F3E.tmp

          Filesize

          414KB

          MD5

          5a3ffc34565341094b4bdb54f25f039f

          SHA1

          5ea452a46a126f33b609262ee7ad6eb787bd6995

          SHA256

          2b28a9e6d87b7b6ae42ff4067b9d958868dfc0a385a8b5c33476788164337ed9

          SHA512

          3de9c9e096cece00e545c95cfd6df1fdb2c98fba41e3858416ff274eb382d129b818cfa5e76686bf7bbd35f434813911d84d9a146a623c64872978e52007ff91

        • \Users\Admin\AppData\Local\Temp\7F3E.tmp

          Filesize

          414KB

          MD5

          5a3ffc34565341094b4bdb54f25f039f

          SHA1

          5ea452a46a126f33b609262ee7ad6eb787bd6995

          SHA256

          2b28a9e6d87b7b6ae42ff4067b9d958868dfc0a385a8b5c33476788164337ed9

          SHA512

          3de9c9e096cece00e545c95cfd6df1fdb2c98fba41e3858416ff274eb382d129b818cfa5e76686bf7bbd35f434813911d84d9a146a623c64872978e52007ff91