Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 14:58

General

  • Target

    2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe

  • Size

    433KB

  • MD5

    e0f6be9ca07a4b8e1a868151399f9ae7

  • SHA1

    85c535edb7347bb5b401696cc296e399fa890864

  • SHA256

    66bcf2c9008d8092ad823a78a280066a18af0546c768a92535b2dba5f82d4673

  • SHA512

    80f5666e8ba0129623662d754c5e42d667caef649f324c48c0c688429d52402241aba3def49a6eddfe390de409996ab77f6a7313cb5b58b20207f04b71bb43a1

  • SSDEEP

    12288:Ci4g+yU+0pAiv+kwFqk4gGUx6/mIQ1bDmN6pmZn:Ci4gXn0pD+5qkIoI8bDl0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\2DE4.tmp
      "C:\Users\Admin\AppData\Local\Temp\2DE4.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-25_e0f6be9ca07a4b8e1a868151399f9ae7_mafia.exe 58FF18AE5689E18AA12CD2748015671F38BCC6F5228E639FF051BCD3693C5D751CED54D035A41D126687F84B8D177EE7ABF6CB7222EB0B43496B529729AA9A7E
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2204

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2DE4.tmp

          Filesize

          433KB

          MD5

          e28a9e33fc3b475afe98f39f0e396603

          SHA1

          dbcff6bf36e2d015ea99f9329b62784678a07f37

          SHA256

          87ea6dcc8c5db80940a5f70bd8bf8405331ce1b17b63e326b86a50fbcb7fb8c6

          SHA512

          c40b70cb8ca2b36c72ed78c578e1cee1d44a079b37b5f15e8f4132eb1196c3964da9d1d86266d6aa083ede8f401efb612e0c18a52a68b6c457e976abe08bc71d