Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17/02/2024, 08:55

General

  • Target

    2024-02-17_f7e7f553c9d0320ef2cb0b8c071b31f1_mafia.exe

  • Size

    479KB

  • MD5

    f7e7f553c9d0320ef2cb0b8c071b31f1

  • SHA1

    d8ceb6d59566e89cfb2590a2ce2675d892c10511

  • SHA256

    8015ba9e8a4bcb42d7e422b4b178b0dc4ad1bbd2544b8a2bf668fe73841ddfb8

  • SHA512

    c801bcefb9c99be6592a9705fac78966bccb9671b50da73f81bd051e28eb8742832da6e211345efe9b2b1f415db08d036ad60ee60f1ec6ebb35be2dc629b2255

  • SSDEEP

    12288:bO4rfItL8HAsvWy7Jv/hBIDxEr6qO1ExKy75UO:bO4rQtGA4XJMDsaExKyVUO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_f7e7f553c9d0320ef2cb0b8c071b31f1_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_f7e7f553c9d0320ef2cb0b8c071b31f1_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\191C.tmp
      "C:\Users\Admin\AppData\Local\Temp\191C.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-17_f7e7f553c9d0320ef2cb0b8c071b31f1_mafia.exe 9B0B3FE4DD50B58B19D7920C12703E5361C351FBD1F67E723698B9487850BFEBBA7298E607920C5EB355CC0836572E4DCD2650EE9245A46BB71B9CABB002BFBB
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2412

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\191C.tmp

          Filesize

          479KB

          MD5

          e70c0a229f6b07ace34f423cfe6c0cd9

          SHA1

          25641a6aaf6274a3dc7a7b54a4c61149cd13a535

          SHA256

          515b6371639e35a66b6d600734060b5432e6808e342cea3262ce016a8dc90ce8

          SHA512

          c829253c45062c6d23222df6df6969fba1fc4c8b155c9e764753ff9513dd1dd37958d6d7c2060fca9e9a7bc8eb32996a2b2cc0fd797481967717347df657d7cf