Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 08:00

General

  • Target

    2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe

  • Size

    468KB

  • MD5

    bade5ddc9dcddfd81bd74f0135e1ff98

  • SHA1

    140c4989c96a2458ad4b9a428550c11b3287df00

  • SHA256

    23a850967df1f679db17b0aa138aef7baca70582edc4eab1911443eb849a9537

  • SHA512

    2464ba7ed236cee2b97bf8e685df533787a3c8d77d6fc0d5db69c038cbac34811fd6c3423865f702aa8d7388518c1c93b0f13e7739db20adf2a88b1aaf5cf717

  • SSDEEP

    12288:qO4rfItL8HGd0P47Ayhu4jXcERBV6h3Z5QJGgIwod7bWmeEVGL:qO4rQtGGdljuksEYhp5QRIwodumeEVGL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\1BBB.tmp
      "C:\Users\Admin\AppData\Local\Temp\1BBB.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe 954D253772E3357A0EB8D18F70821D092E17AE4BA07448B5503951402887FAD325C2857700A75D18F1CF15364AB387524A92EDFF5351A95AA5245BE401136EE1
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1976

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1BBB.tmp

    Filesize

    468KB

    MD5

    b91114a900eda3f54755772f06fb2c9c

    SHA1

    67fdcb88cdf3a94aa23aeb57b7a6cfb9dd9e605f

    SHA256

    482051876b01f6e0668f4867cabd48df1a819a82a1b8dff7cdc0989246a88591

    SHA512

    9e07647d5b0ada169d79b57ac04f400d8ae88575209c3f7c022e03d0104a62506f13f9f0feba702d7542e908e920bb1a6f4b8122716f327e599971f40fc37edb