Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17/02/2024, 07:46

General

  • Target

    2024-02-17_a410979b019091de4c640d443411e717_mafia.exe

  • Size

    411KB

  • MD5

    a410979b019091de4c640d443411e717

  • SHA1

    f4ec3c1dd15cfaff76a7770dce79628f071245d7

  • SHA256

    c3593479598d1efd90205fe463d418395ac805ee69a7b3e96fa5f38814d7d140

  • SHA512

    e785fc8149dec176ce711fb25a37c3d09847e9327791c221064a453557757307c459a9adbb8cba2f2aa6d51ca26a18d05b4b48c2ce06a29a077794402e9f5197

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFWSX51ixEshffP68qswJfpURgkdTwUfqHI:gZLolhNVyErq51iWwHPXOpURxTwUfqHI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_a410979b019091de4c640d443411e717_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_a410979b019091de4c640d443411e717_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\5F11.tmp
      "C:\Users\Admin\AppData\Local\Temp\5F11.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-17_a410979b019091de4c640d443411e717_mafia.exe 4BE886D1234CD75F77FCB01707AD431B89E2E885B93B1387AB17A2B6742CBBF3CC93FF6785919CBB61017F09F908DC17A731AA6CD79984D8F335A85118C7F42E
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1264

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\5F11.tmp

          Filesize

          411KB

          MD5

          d1970fc2c6585eb1546309f6f7e06ded

          SHA1

          c041366716bba0cbdeefffefd1928668a35596a8

          SHA256

          66bdc0cef6170403dfa179d7569ba72d5a07f81025d48d68d3adeb6c24c6f6be

          SHA512

          fe9c177fe29d4110be7433748a583119b64103b0637b7c54a1829e8513efe186d97f60949eda32681a9354efe34fc26c9b7e9cd4693cab1ae2421bf8c6d760ba