Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 05:49

General

  • Target

    2024-01-10_51ee6eafc4c26e80303db1a92686f1ca_mafia.exe

  • Size

    384KB

  • MD5

    51ee6eafc4c26e80303db1a92686f1ca

  • SHA1

    4a0aaf27dd64027722da1d89ccab03b33428a340

  • SHA256

    e8117f8dfa491b85660fc7d436318f9a351dc0df0d3382e2c94dde7018e1d5ea

  • SHA512

    b5e5c6f59e82308de71741facb1cabf5bd3254079b7208c2aaa78d5268f07b719260323edad5d04a64af55ed496d6d620ed002cb7ea11c160f4347299985d8f1

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hHnrrW2UxpOfU+Jy4Zv1cmhzWDu2lZ:Zm48gODxbztO2UCfUKy72WLZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_51ee6eafc4c26e80303db1a92686f1ca_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_51ee6eafc4c26e80303db1a92686f1ca_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\233A.tmp
      "C:\Users\Admin\AppData\Local\Temp\233A.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-10_51ee6eafc4c26e80303db1a92686f1ca_mafia.exe A9D88D24712F742F3AB999D88B19EA6793FAE4B5CB64AD7844DBDC9D211AD89D95B4F0F3D3C4D1347BA7EC636D9028CB4A908B48471B21033EC81B0F5E354799
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\233A.tmp

    Filesize

    384KB

    MD5

    0fefbc06538e75cef3992b063bb790de

    SHA1

    f5e398274f07d306ecb640b548b5ffaf5e32ea93

    SHA256

    efce2be4d82dec6aafd8856a8563567ca8ccebf16e0b12c29263af7d4cce3d0a

    SHA512

    185ad97fbd37a46857661c3bf5588d14a90a8812396e648e898b31675191d0161765e52a38b4456d95625bf60e3d95cba81bb40c2f58d2c72d09aa0d2dd7ff40