Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 08:23

General

  • Target

    2024-01-25_19e6593de80a97df50c0ecc4c0a71f2c_mafia.exe

  • Size

    384KB

  • MD5

    19e6593de80a97df50c0ecc4c0a71f2c

  • SHA1

    ce50d3c3088a3323cd5be215118b73f388136246

  • SHA256

    e31660e36a941302346fa9a63522205961154320e6754238543b46ca0ae02767

  • SHA512

    d7e305d3c9a7ae48d9bf3bd79e4115441d67487df4e2277a44a18116d7e60b5b42567dfb0c641e04739ae42a6e33a85b12fb4863cb382d7bc9923a0d2074fcd3

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hHm6cF3VuA9Bd+ZAywQfDtR58KybZoJEDPW12smRy:Zm48gODxbzYXF3JnYFBDt78KmZ5DG2lU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_19e6593de80a97df50c0ecc4c0a71f2c_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_19e6593de80a97df50c0ecc4c0a71f2c_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\3591.tmp
      "C:\Users\Admin\AppData\Local\Temp\3591.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-25_19e6593de80a97df50c0ecc4c0a71f2c_mafia.exe C36A738EB497BC5F8E9EC8D4A0B5FD71959FE51191BA46B03FFA940C7FB84826690E62FA336902B166007A10BAF7C06581644FDFD916688A689F77E6206D8ED9
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2308

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\3591.tmp

          Filesize

          384KB

          MD5

          004505da92de6338f7dc698e4e514c25

          SHA1

          e7000f8a765f5f32b39c83587171db845907a364

          SHA256

          a23b9e3631b9006bd0254ee8e3fc686dc46f8ea75689e5fcf8c0b3026849fd03

          SHA512

          af33765c84867a8df1d03ce782f58e3c8e011f7059eeaab27b83f3ae09ef5515ab7388e5e5673e8dd7dd1c9f00e8b2fe590e6e2338ecdfe7494f0f465bf261d1