Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2024, 21:48

General

  • Target

    2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe

  • Size

    384KB

  • MD5

    d332554c641a77dd70562f87ea9675f8

  • SHA1

    bfb077f355ab2fc1c6fb322970e109bcc63edfe1

  • SHA256

    e6deb06b9b5e6494412c55c2b430c8921aa056960d262df1577d5f381ca83c8f

  • SHA512

    aa5bcd46fa1d88dae84a264dcde359f7e99f6b99c3ed7c751b801778b116ddc398b86a9c45932791e04963dd60910a863e7bd3b85741ef5a043d8cf051326a70

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hHGbGQDvE1ZuGg9LSVQoJfCmf2F2LjbNW27Z:Zm48gODxbzoDwEG5eoJfCmA2PbLZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\39C6.tmp
      "C:\Users\Admin\AppData\Local\Temp\39C6.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 3D0008048CC10DBD29FA3C91CDC4F059D939F6CE85DD040AB514C71E9C787E9D79CCBB1FA47EAD97A105324D7C7B0D8C2B11E8EE24B125F3F9007E0D50FF6306
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\39C6.tmp

    Filesize

    384KB

    MD5

    f4287edd05806c0954744157ec1d81d2

    SHA1

    0f0b2b6764765b942617bd30c32ae3df971fe6c4

    SHA256

    aad0492ee724cc0e548bb448ff10b4f9d1299cd482b1f25f8ab5ffe7b85150c6

    SHA512

    9afd93729a7503ed86228af41eb9fd4c1e99d22069497d8271e863a19e3724dd7e30a8cefd29d257d7f5db084effd2abbcb1ed49ac4511088157f0e6b664fa1e