Analysis

  • max time kernel
    117s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 00:10

General

  • Target

    2023-08-25_72f28d44aebc4d0ab917a75c3144b2ca_mafia_JC.exe

  • Size

    444KB

  • MD5

    72f28d44aebc4d0ab917a75c3144b2ca

  • SHA1

    1b9add9100deaba9aa9e51e5c74266af2dbafa60

  • SHA256

    f7c8afeb6d07f775ff7810d69ffed557a2702deb78b99f654e34ca408eccae55

  • SHA512

    7dca77d532f3ff334fc8027f0b80608c52c67eae6dcff57c7ef9bf11d08734ac8ad50714ee3b0fc77b1056716751e241b4e3ae7839833b07df687e12b5c34a65

  • SSDEEP

    6144:fFrJxvldL4c5ONK1xgWbd1s79+iStS48T2tdfxNT4AD911BUnzAnag4gi8ZaNHnd:Nb4bZudi79Lp48T2NTzZ7Wn2+NH3EA

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-25_72f28d44aebc4d0ab917a75c3144b2ca_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-25_72f28d44aebc4d0ab917a75c3144b2ca_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\71F5.tmp
      "C:\Users\Admin\AppData\Local\Temp\71F5.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2023-08-25_72f28d44aebc4d0ab917a75c3144b2ca_mafia_JC.exe F8378AAB1A191D4A372D4062A566FAD6F87291BAFC5B6819AA383459BFE518F1299609FA70982F78FEBE9CFAE9DC47465003DB592301CD76346F06E8C860EA5D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\71F5.tmp

    Filesize

    444KB

    MD5

    60c37c8846b2870aa1629623c170ac14

    SHA1

    387a9f331a6da59cd553d315c0078191a0eef65c

    SHA256

    490a3140928ff8ef7dface8a0bd46f53bf93393bc64cb2e26793338fe9f6e230

    SHA512

    fb80b347229b53f85dd8bde0440ffa37ddc01c5ce0b66dfad5fffd419fa5b27a697b0cae16a37db72e1a6db034dd6f4187013ba4147a32855d096ae3cf728007

  • \Users\Admin\AppData\Local\Temp\71F5.tmp

    Filesize

    444KB

    MD5

    60c37c8846b2870aa1629623c170ac14

    SHA1

    387a9f331a6da59cd553d315c0078191a0eef65c

    SHA256

    490a3140928ff8ef7dface8a0bd46f53bf93393bc64cb2e26793338fe9f6e230

    SHA512

    fb80b347229b53f85dd8bde0440ffa37ddc01c5ce0b66dfad5fffd419fa5b27a697b0cae16a37db72e1a6db034dd6f4187013ba4147a32855d096ae3cf728007