Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 12:45

General

  • Target

    2024-01-28_9cdeb439e4af837fe7684abcefdbe503_mafia.exe

  • Size

    411KB

  • MD5

    9cdeb439e4af837fe7684abcefdbe503

  • SHA1

    7f9d1fb53cfd144c44d35072ad1fd6b0d051f60c

  • SHA256

    cfc9f502565b91ae81a4fff76f470b52069d7b7d0106e72c3cebaad5954d1b4f

  • SHA512

    0f71a91e3a7170b48b92467a11cb701651b9a5f89eafbb20a8fd5da2ef793407e5ee94473f8d153508eaf35a258db586c38a57599366c30d45dfcbe009dcaaa9

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFaZHFEC4V5q1pi+2Cfs9t8D6PEouVPZWTFcZqHI:gZLolhNVyEZ/di6fs08OZWJcZqHI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_9cdeb439e4af837fe7684abcefdbe503_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_9cdeb439e4af837fe7684abcefdbe503_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\C60.tmp
      "C:\Users\Admin\AppData\Local\Temp\C60.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-28_9cdeb439e4af837fe7684abcefdbe503_mafia.exe D51490DFF1CFD17C6D4D23BB59E7D284E0CCAE7BC65A6B8E558E8FF3EF764E1F03A59142D6FC0F468194E1A09A1AE9A090550810D9B6A9A84A0433C815EB62C6
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2184

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\C60.tmp

    Filesize

    411KB

    MD5

    b8bbb512f2db2c9c7ddf04ac3c9f99fa

    SHA1

    eecddc13f8407e4df4001ff8b80e2ec8f7545068

    SHA256

    7712c61e9cd03e5cb2308780b7a0196fb6d93400362fa92d603979fd541447d9

    SHA512

    234e174333cc4d203fd9f33c2c1f42de1f3fcc586114c256beee9e4f59328c0139a67b2f8e7c94856f4a6c20be713932c2af3f02445a8ae307fd669a8f1a2510