Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/01/2024, 05:23

General

  • Target

    2024-01-29_097f91e7b55604c4aa6bad77a5a0b124_mafia.exe

  • Size

    476KB

  • MD5

    097f91e7b55604c4aa6bad77a5a0b124

  • SHA1

    6a565646bc22fbb41d64dec127e27f8fccb2cc36

  • SHA256

    eccbd08c459af9c19a68cacbe7e4fc3dc518199ba7f05cc2002a4fd64fdbbb18

  • SHA512

    03fcc3125312ba70b18c10d7302178bab201755108e64e344b59e5b10f182219998e674fe980b34008bff53b9c138c47c3f7fbdd507cac492bfea6da5f559cd3

  • SSDEEP

    12288:aO4rfItL8HRTgyEnk2d93b5y3yAc4FS27K9wlsDpVFd:aO4rQtGRgB39bAc4FS2+9wlsDpVFd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-29_097f91e7b55604c4aa6bad77a5a0b124_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-29_097f91e7b55604c4aa6bad77a5a0b124_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Users\Admin\AppData\Local\Temp\2443.tmp
      "C:\Users\Admin\AppData\Local\Temp\2443.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-29_097f91e7b55604c4aa6bad77a5a0b124_mafia.exe 5582F363DD5CA665AC4964887C6B8F811A6F1A3AA9091C62D13501B2E1089A78E735F6740321A6C208AF036C0C907982816B41A423D83F0C502A3A5513A9F568
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2856

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2443.tmp

    Filesize

    476KB

    MD5

    4561f59b263618284e05079e6aefd244

    SHA1

    bda05a4110a355d69c3d4a398754f97017363374

    SHA256

    c1919601caa5dd24e5b88a80146469136aca67bec6f7fd3e9c350dd832cee325

    SHA512

    201a5c51f518c5324a036c33007a4de5832ef5062c82512e3d59263d0938111ddb186aeb9040f925ebdec0b76172b8e47dce320355b95612e54bbf5b659e5ae0