Analysis

  • max time kernel
    123s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 02:34

General

  • Target

    2024-02-03_b63ead1ebb713c0963bc9a2771346300_mafia.exe

  • Size

    479KB

  • MD5

    b63ead1ebb713c0963bc9a2771346300

  • SHA1

    ceea59a7c03bc26c0c51571694be1f14791e5b5c

  • SHA256

    9d1462465bbbc74634f48963b53ffda7e426a95011909a6f0bc99faf51f7bd48

  • SHA512

    02b65d4297a23cad48f03d403aa5a2fe01d9ee8bcbf0ceb27dffdd14ee1102d998a9eeb009beab5f683a398bd99ab8a854fe68c1917a1d08b7076636fd846585

  • SSDEEP

    6144:b9EyS4oMxIkjxcWqHtg88HARRFnzn8cm2kshQaWaQ6daBcNgl4GTPW+3BUzsEf7z:bO4rfItL8HAhn8l2kcChP37K75UO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_b63ead1ebb713c0963bc9a2771346300_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_b63ead1ebb713c0963bc9a2771346300_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\5B59.tmp
      "C:\Users\Admin\AppData\Local\Temp\5B59.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-03_b63ead1ebb713c0963bc9a2771346300_mafia.exe 33385C7032079FE32089ECD4A1CBD54E0AD918C0650E043F0ABD3C34E77CABC06B419A3B03B45AE1407A51C51761A0288E3D8E82D2192F440530089E76164970
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\5B59.tmp

    Filesize

    479KB

    MD5

    fa00b6cacf0d43314b0bf0e9d27e918e

    SHA1

    22d3b8d262dbbefd757dced47db1b270d38a9c06

    SHA256

    136c0bceb110d6ec6433e8acb09b3b315097dc443ca9c47020aae7bd0f4eca07

    SHA512

    f350d9dbc29eabacfb3ccbf6d6568e07910f5a134591a3cb6c3541bd2eb739891ac50b7f1ead2b9129d06edc395d1a06fa953834bc49dff0defedaa7f2fd701b