Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2024 08:30

General

  • Target

    2024-02-04_9131e20858a56f028a68baa9c2b96d98_mafia.exe

  • Size

    479KB

  • MD5

    9131e20858a56f028a68baa9c2b96d98

  • SHA1

    6a5f60e79124dbfcb5d3a1c75e2be3bf50489254

  • SHA256

    779e169623dca6db4236a263e84fe012a958382c97fe9c56268bd33d91324d9d

  • SHA512

    88bfb96ece80aec592f6f3f72a9d012a887af697762fe8037110569365e593c38593050296bae731aa40ff63b5aee3fb3369a343bc484b7dd050ab82cfa0fd4e

  • SSDEEP

    6144:b9EyS4oMxIkjxcWqHtg88HARRCg1BhaARvTF5t9nbPyymLDY75UNY:bO4rfItL8HAagXhPj6Ls75UO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_9131e20858a56f028a68baa9c2b96d98_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_9131e20858a56f028a68baa9c2b96d98_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\3F7.tmp
      "C:\Users\Admin\AppData\Local\Temp\3F7.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-04_9131e20858a56f028a68baa9c2b96d98_mafia.exe 4F61F99963F71A31E8CA0B4E414CC3E220352E5FCA8FCF4242549E8A6DD99DB9CC94D389FBD3D6CEA94758F5943D3D26AE8D5D51A4F16303A6F0DECA91AE4986
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2288

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3F7.tmp

    Filesize

    479KB

    MD5

    1fbbab3820a2691467b893ea957a5877

    SHA1

    2e5cec82ef9150958a22334537b4601fccff85a9

    SHA256

    fee3a403dfcd32ba739e257c93695b28f934d98f0485a19ee8ccdb6f4e9f4b3b

    SHA512

    e707d63e142b0b334ec2312842ae789fa90e78f722c564c3607a61a4bbd51ed3a2238b566c91a913ab8468be8bf18110c546fd9e0730287ad2939bb8b0648b58