Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 08:31

General

  • Target

    2024-01-24_7e8f9d135eb131908b04dcecb0aa1de2_mafia.exe

  • Size

    444KB

  • MD5

    7e8f9d135eb131908b04dcecb0aa1de2

  • SHA1

    e168c005d8e96689637d33c19b369862fbcd7109

  • SHA256

    2504a345bc86535d695fa539d8bb968753f31fdaa1ed2f58962da116f73fcc25

  • SHA512

    aaa060178bd30ed6d85192b4f957e546a6e2e5bdc2486944112c3f510689327fec9f58a95381b49209d1b03ff10ee8c0ab58b2063c719245f8ea16758797155f

  • SSDEEP

    12288:Nb4bZudi79LzuIDPMIYh7dCXopMEvhcA:Nb4bcdkLzTHYJ7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_7e8f9d135eb131908b04dcecb0aa1de2_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_7e8f9d135eb131908b04dcecb0aa1de2_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Users\Admin\AppData\Local\Temp\4402.tmp
      "C:\Users\Admin\AppData\Local\Temp\4402.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-24_7e8f9d135eb131908b04dcecb0aa1de2_mafia.exe BB0EFD378208EB29F93C4C7BE308A3A69BE4BD4E43F742C268F5DF73EC608D10C6C863E4EE9D377352BE9671EA5FBB77719AC7FE2FD0B623EB70E42EDA0E5CBE
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2808

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\4402.tmp

          Filesize

          444KB

          MD5

          31c91fc797d37d41fea9b74f9d3a4690

          SHA1

          818e2deeed65231d7b4ad57cf34b605b0bbea706

          SHA256

          696023ae6cb0b55ac0d3b312c1533d8f7130fdfc04e634115ceba7997d35d39b

          SHA512

          c0662ec3e18a42e909d460e0a28365715c8bbd3241e01d3ec7e1d5f9e90de26e9068f5ccb0b4b460ffa3a18eee4568aba5347e77e3ed8331505b9bf1d43f67b5