Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 06:07

General

  • Target

    2024-01-11_ee9a9ea27774279365ee2bccb1b30bde_mafia.exe

  • Size

    486KB

  • MD5

    ee9a9ea27774279365ee2bccb1b30bde

  • SHA1

    8277a88b7eff575636abd6938ef6e09edda92fe6

  • SHA256

    faf531b6ce382884b4e77780d279936d1baf63d34bcd5e289e12cedfce845e3d

  • SHA512

    e4bb173f2ab7fe76075ae1ecafdbe586644d8f4af9d2691ce6515db973e58ecb27401c0bf7a8bc5c7e6d404cd532f2ccf77d1f0fef9072963d016b93e626d999

  • SSDEEP

    12288:3O4rfItL8HPybjyoXqtZNAP+eCTDMs7rKxUYXhW:3O4rQtGPa+qoZqWee3KxUYXhW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_ee9a9ea27774279365ee2bccb1b30bde_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_ee9a9ea27774279365ee2bccb1b30bde_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Local\Temp\7FAB.tmp
      "C:\Users\Admin\AppData\Local\Temp\7FAB.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-11_ee9a9ea27774279365ee2bccb1b30bde_mafia.exe 3355B1CE89AC62DDA82886A9D63A85133398B6E5C0291C01453F4919FD1A7487BE5ADEE31FB561635327F4D2BC355906221105D26E3443BC99743C00DE0A538F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1784

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\7FAB.tmp

    Filesize

    486KB

    MD5

    52469adb5dd62a07d9e7889aa0b956ee

    SHA1

    c388bdda1dac89a926774158bfd9b379cd0cf106

    SHA256

    9f981cc65db7414ae7c32c65b6f74e368a76021601cf85efe5fb604afe03fcf9

    SHA512

    ff82c3199e8a3d173435be35d2b1e5c7d107bfdd38f65c3b938ee3bfa6404f992471c906add54cabe2a1b11c12366988457873b0f8a639332b9b9d7c15d3678e