Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/02/2024, 10:44

General

  • Target

    2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe

  • Size

    476KB

  • MD5

    ff7edbd8863c7382746712c3429cc903

  • SHA1

    43559325ac24c1babb39d36c436844dce9d3db3f

  • SHA256

    52dcd4b00fb68ac4b4f69edbef59b755be3f02e5e011dd332c2dba4238ce6a28

  • SHA512

    8e9d59e22f7ccfd1d250f783dea807779f754a28a73b8c068410d89e167196e9914484f5df7dc5f6c6d239fa5a2bb666deea2d125312def28f31dc5360db9967

  • SSDEEP

    12288:aO4rfItL8HRBUfD0NFm5USiTqYO4Jh1s9aHSiFb+YifW7K9wlsDpVFd:aO4rQtGRBiEFmliu9U1wPqiW+9wlsDpN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Users\Admin\AppData\Local\Temp\786B.tmp
      "C:\Users\Admin\AppData\Local\Temp\786B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-18_ff7edbd8863c7382746712c3429cc903_mafia.exe 008F9318628F9B515F37995C20465D06235A663A9E2C4351DABC3015F74808BB33F7D3DED2FEE5C50AF709DD385430181A5418B65C54753AE787A9A6A757854A
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2984

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\786B.tmp

          Filesize

          476KB

          MD5

          3ba4aebf7c89901eba681250ad7e2481

          SHA1

          62b2084acd03a0adda2946540e41588c954dd534

          SHA256

          432fdc4506aaf1eb8cec9e05a2448d0c6844975ae3a56af78696f96ecec82b98

          SHA512

          8565374e40116482c8e4edc4ea914199486e2d16b8104600db7d85ad8e8aab12e6b3e4a406753c88e9a756f837a142805b04762e62ab64dabf2a573f84dafd6c