Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2024 14:26

General

  • Target

    2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe

  • Size

    428KB

  • MD5

    c98e24a84a897a6a1ba0cec5078cee45

  • SHA1

    a56283ef7a2632bb6713c4c10d052058b9cc5c2b

  • SHA256

    fdf1ca5a35ea2d55d1ad3cfd73f0a33dd1c26e1c0c5e9ef5f71187cf07e30079

  • SHA512

    fa2b5028066c81049bec84078ac18a55df5f233d01206513f52930a7ae790594c7e2f1f666fe0e3f80a7e43cc48c511254a40be11650ffc7c2c7f067479a6cf0

  • SSDEEP

    12288:Z594+AcL4tBekiuKzErorooIAREbt/bMSIRbKqEygXp7eMXil:BL4tBekiuVrE1IlYpKqEygXpSIi

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\57D0.tmp
      "C:\Users\Admin\AppData\Local\Temp\57D0.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe 4421E91A42F345E6A5369D0EA17E7288EAC051B4E813BB23C54922DE15841BF2F94DD8838CDE3C203F07131200C5DC8921A34EA17E867D5748B28252BB3BDB30
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1080

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\57D0.tmp

    Filesize

    428KB

    MD5

    606c89f64c714db617e782a7119dc9b3

    SHA1

    ef975838ebd3b0458ed86d8112efc6f4d576ad8d

    SHA256

    6d754735c4b05e6fa79c7054de84cf10f609532900f9c27a1ef04edd6880d4c2

    SHA512

    590847b3e7c383afb5cbd737783ba2224a9a4e21a07fe06b0c16e31659f78a8dfa6eae447641372823bcec823a1a0943b39b358f9154094b13c6ec28142bde2a