Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 23:12

General

  • Target

    2024-01-18_a772fd6586935cd9cf98e366fe0fd23b_mafia.exe

  • Size

    476KB

  • MD5

    a772fd6586935cd9cf98e366fe0fd23b

  • SHA1

    5ac50d56fb22c414578f145146ccef8521b84333

  • SHA256

    943e0af79c922e09f6fb820ae46a1c8a95103b1d053bedec0676f73a33f7488b

  • SHA512

    b7e3636ea510246bfce73bce193ab976305cbbded173412f14e321f39e57cbb88cb52e4d56edcbf927ec0fcc8aba8605de45dc58dbb4376802aec8733949b156

  • SSDEEP

    12288:aO4rfItL8HRWrcKCuvUpJj890Wx5oE4RH7K9wlsDpVFd:aO4rQtGRMvU3jUpxyx+9wlsDpVFd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_a772fd6586935cd9cf98e366fe0fd23b_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_a772fd6586935cd9cf98e366fe0fd23b_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\AppData\Local\Temp\9EEE.tmp
      "C:\Users\Admin\AppData\Local\Temp\9EEE.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-18_a772fd6586935cd9cf98e366fe0fd23b_mafia.exe EEF10CD6B6D035CC643E35C9AC5852A290410B161C6A346E460D3AFDE7039EE8057B7EB121480FAC435CF897A1DECEC7F876F092771A8861DF7E948000048183
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2288

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\9EEE.tmp

          Filesize

          476KB

          MD5

          9b3622e88eb0779e46af0e1d194cd539

          SHA1

          eeab6393c5ae353aeccb0b5a133d2d8258445bff

          SHA256

          bef01e9ef204650ec5da11c24eda86992831c5012cdf199e454f3ffd92140542

          SHA512

          e9e0d5c407f8d52827fdd2c42ddbe3fd5525bca7e182d381367cdfdffab0c8a6671abf72328dd3ef93ff0f2ed325778f2f691b80b026f924f2646309ab308a93