Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2023 17:07

General

  • Target

    2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe

  • Size

    384KB

  • MD5

    729701ca6ab4679f45bc0191b8c072f0

  • SHA1

    e7505bde4aa3ae60d7f81c404c615ee44d48d804

  • SHA256

    35a81e0d19f009dd18d4af6c5a234db7642705ec6c77639e5e8afceeb50e5237

  • SHA512

    941edfae930c85daafa304e7fa4379fa66ab0c96021fdf77fc5cf69cbd2daf470a3c55ebdd586e2cc301b285bb25079a2085a12addab3c801b66dee7f4151bb4

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hH+O81+OgO5tftD8aoEPVG4kewZ6397MsT08lZ:Zm48gODxbzEv+dGJ8P/41wTZ8lZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\7417.tmp
      "C:\Users\Admin\AppData\Local\Temp\7417.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2023-08-27_729701ca6ab4679f45bc0191b8c072f0_mafia_JC.exe F38D7B9301756DD0A85D6D79F1AF8962BD05EFD52447F37A609E3CCD7EBB79588867BE0DE76F3FB6EEE9404B030461D4B05E34FABCBAA8D7887B341A8E692221
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7417.tmp

    Filesize

    384KB

    MD5

    cae2a058925c1772c5595e027e953919

    SHA1

    05dfa649a256dfca216c57bd4746cf261c77b014

    SHA256

    5be6380b1df2c2eb836c7ab4f9d118c4d991e611b689e3e48a2854b59e14d3bd

    SHA512

    41190aafa8e4c34b0989137de85347ea028e60107007c0f1c03917863baea6dc3691556d1e26b7ce06e81e8d756df47bee9c52ef0ca305a6c7e9c1bd2158a96f

  • \Users\Admin\AppData\Local\Temp\7417.tmp

    Filesize

    384KB

    MD5

    cae2a058925c1772c5595e027e953919

    SHA1

    05dfa649a256dfca216c57bd4746cf261c77b014

    SHA256

    5be6380b1df2c2eb836c7ab4f9d118c4d991e611b689e3e48a2854b59e14d3bd

    SHA512

    41190aafa8e4c34b0989137de85347ea028e60107007c0f1c03917863baea6dc3691556d1e26b7ce06e81e8d756df47bee9c52ef0ca305a6c7e9c1bd2158a96f