Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2024 19:28

General

  • Target

    2024-02-04_44f96357d51ee019085d5e69c36bde86_mafia.exe

  • Size

    486KB

  • MD5

    44f96357d51ee019085d5e69c36bde86

  • SHA1

    c5d65f899e9a31d98aa52da7e65dd16e5a967438

  • SHA256

    7b84c532c68c485cefc11ffae9b9799cb62acc7f849bd8b810fe78b7b50c0443

  • SHA512

    630e74c3d33daeebfdbdde397b734bd9835c688a8ad973ac507754cf5aa1770098a959d1f230722105a285fb9dd391b12906aea92f0c7dc7ac6d32fb64037c63

  • SSDEEP

    12288:3O4rfItL8HP/tE4jLVmcD3DmKz2di7n12jhPJ37rKxUYXhW:3O4rQtGPO4XYETvCU7n1k53KxUYXhW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_44f96357d51ee019085d5e69c36bde86_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_44f96357d51ee019085d5e69c36bde86_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\2839.tmp
      "C:\Users\Admin\AppData\Local\Temp\2839.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-04_44f96357d51ee019085d5e69c36bde86_mafia.exe 140C9DDC6129645C135EFE8B89FA8346F5A1BE582C9BA07AF537E0153A04C6276277EB2FA5D50CC5670270438716878B3934C358647CC5DFD7E2E84E6FB1E6AD
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1764

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\2839.tmp

    Filesize

    486KB

    MD5

    4f2dd00f09e05f349faf00b846c5450a

    SHA1

    22c89423086199f9b2b4acaf1c0229d226f2b4ab

    SHA256

    033269b85e039dfb08bcd8e4f79ec10be7a8ed780e226293526271c973390792

    SHA512

    763fedd6c44dc86282e057d2e0681566aab4ff7025355cc1f438ac6bdb103333b3478ee053dea460a3a493c2620395f02609aff8833d8d3edc60892b29d0a2b3