Analysis

  • max time kernel
    16s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 05:56

General

  • Target

    2024-01-10_c2eeb25b0b754b2df031841b7deb3232_mafia.exe

  • Size

    433KB

  • MD5

    c2eeb25b0b754b2df031841b7deb3232

  • SHA1

    5ab6ed4370c511c707ef36f6f7a25ff1bff50985

  • SHA256

    69554630c1b2a51a618334b88b1738bcbe9afe483571351860b477c1f4df7348

  • SHA512

    5dc0cc230f939c4a1803a8b62fa375f1babe2b8494211881314f819b67709063d579f810fa5b2bc6a0e2540981e2fd22b86895415d36cf7a69b33cd0d1434320

  • SSDEEP

    12288:Ci4g+yU+0pAiv+Nr9ernIe5IVWn4hre47Bqdcvsqlan:Ci4gXn0pD+NxereW4GQsP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_c2eeb25b0b754b2df031841b7deb3232_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_c2eeb25b0b754b2df031841b7deb3232_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\A064.tmp
      "C:\Users\Admin\AppData\Local\Temp\A064.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-10_c2eeb25b0b754b2df031841b7deb3232_mafia.exe 52980C6B54C2AC920A641072CB6DA51362718B19A33E63C764EEBDF28ABD5E737583A079C4627E3625D25CAC7FB8A03006C284389265C1838B0BFAD571A0EDD3
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2876

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A064.tmp

    Filesize

    433KB

    MD5

    dcb015b6e95bf457f1face3c8eca9034

    SHA1

    1ac6998f595a4a6d344ce8c83a8b159fa4befdf2

    SHA256

    bf1a45456952583cfc9e89766f286ae7f11e19fb79c45a409e83713a5daa4fdb

    SHA512

    3cd67d89696f9a16553b01919192bcb9c70794944415c99f5a9301c9d06e07340b1d7c5885e5803ba0391ae84f93c7d584ed5d3f8c02b4e5c11b282c338c5b09