Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 05:53

General

  • Target

    2024-01-01_f4b843bc1962f0e86f77dd042a22e2a4_mafia.exe

  • Size

    433KB

  • MD5

    f4b843bc1962f0e86f77dd042a22e2a4

  • SHA1

    008d018ce3dad269209c0e38ac034029e4070a0f

  • SHA256

    df5613c0408d4d826289f47be380f4e72d1e282797008e33b78087547ed08884

  • SHA512

    704a2bdada279705b060cd0eb3ea4337f306123b0e6612df2f0590822e07e8431e4d7b36cd9f9b28944d5d592635f2b3873dadc3c8354daadab7ca5fcd5037c3

  • SSDEEP

    12288:Ci4g+yU+0pAiv+JSndL6ZXLyPYHIip/VzV5Nln:Ci4gXn0pD+JZZ7yPaIiphNd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_f4b843bc1962f0e86f77dd042a22e2a4_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_f4b843bc1962f0e86f77dd042a22e2a4_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\4E01.tmp
      "C:\Users\Admin\AppData\Local\Temp\4E01.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-01_f4b843bc1962f0e86f77dd042a22e2a4_mafia.exe 8AD8CA8786A744810C5B0F01E89A1A2D9B9474DEB7D464F5CF72DDB6C4433C0F9DB1ABC6F95A1A03E3B0B97AACBE325006B643C02AFFC551BC4E4CC0C69E2692
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2256

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4E01.tmp

    Filesize

    433KB

    MD5

    f2cd43bc7d5ffe079760a44f4134451e

    SHA1

    30aaa66894c148f351477e99a769a762500b2cfd

    SHA256

    71302bef4a9cbd88434682f53d61a67e60a75d5a2f0df646859760853be5ba77

    SHA512

    f41c55442e4f2a0eefb4605d807ce7ad4866c99cb8bcadbb9d938d5fa2c854aef4067d59fa64a63c90cb4f6d0547b0e8a14975d8940f7874d9d54d54a606b024