Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 17:29

General

  • Target

    2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe

  • Size

    384KB

  • MD5

    1a26b1c128b6ca888354509e2a353f7e

  • SHA1

    dceb42ee73e3c64951acebc7cb979574cd8de2dd

  • SHA256

    335990b2b6a9fb7832f9464c12417fd1346b05a524322561455c270ef4914768

  • SHA512

    eec8cd2a5a82844ed549399b6e65153d962b3032679096f42dfc781f12c1cbe4c2214946652c76a6caa6a9039efb55423f23d5a38a774aa9f7b5679679762e2a

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hH4HqnBOR0nIR9CIlIixxrBNUD0oPDgvRWQP+7KPY:Zm48gODxbzcqW0nIR9CI7xdkDDDgZm7N

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\3830.tmp
      "C:\Users\Admin\AppData\Local\Temp\3830.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-13_1a26b1c128b6ca888354509e2a353f7e_mafia.exe 4296ED602907FB71873A01B159CA35F096E7576831CAEA053401272C8A60BE4835E3A41A7959DCFE46E2A51D8C0BA735964971A28F37064D79D608B3FB8E4385
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3830.tmp

    Filesize

    384KB

    MD5

    115707b884a4aad72ddeda184f2859c4

    SHA1

    790311e7c2c909065afeade76cf094d635bce5b2

    SHA256

    7af592fcf5a1cdc5367d5a0d66cf8797dbfeac255718b65911274eb5131183e9

    SHA512

    7fe4fa85763fbaa30fb712b41c0610c9237a2fbd24ae0b4cafc434c1e2413abba1d031ab5b7856348307d80e064012a5bcec198d66c3c1ea196c0f5cf27b020a