Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2024, 16:47

General

  • Target

    2024-02-01_d5471b9141551d2fb341eb3cd745b037_mafia.exe

  • Size

    384KB

  • MD5

    d5471b9141551d2fb341eb3cd745b037

  • SHA1

    cb4f533abf1e40d5233e4ac6a0d5768fa86318bb

  • SHA256

    114fdff114e751b79bbaac99829f5a379b20d9431d8b663ca392ee7c050a8cc5

  • SHA512

    e209a6b620203612f15c9d54f5a36a28bec118c28254231ebf759c3f8c758dbe99a6e45d64c6df71eb1c2ae5803d02fa0036957e1e51ca88bfd62c36eefbf96a

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hHUXZpGyyDi4md3a+24q4V7oOhfjYZ:Zm48gODxbzQ6yyDi7d3a+r7jhrYZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_d5471b9141551d2fb341eb3cd745b037_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_d5471b9141551d2fb341eb3cd745b037_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\475C.tmp
      "C:\Users\Admin\AppData\Local\Temp\475C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-01_d5471b9141551d2fb341eb3cd745b037_mafia.exe CB98B99B71E0A544367F26CCA97A579437006755AFCFDF5A42830467070425B458D89AF59BF073358FED91B1AB30ECC49F1AF1DB62E59348FF5B9DAB68A50E30
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2276

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\475C.tmp

          Filesize

          384KB

          MD5

          283131a5e8a46c6c7d16b9ba12dd0420

          SHA1

          581db0f228b6c2719a1abde429c54bc8c9f48bb5

          SHA256

          403d62d221d6209333c6acf8abac6e13b5ed7e93ba027ca6c8adc3e2aaec7e1e

          SHA512

          f6a3af320303936c075cbeafc38fb9bff49d73d7b3e1fd27750681ee4bce9792572fb5ce821f5d48cb149bcaac8882a071711414d093cf6d7763e2a249a94fc3