Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2024, 16:38

General

  • Target

    2024-02-19_737541d5b664f5c1dc5cd7716cdc81b6_mafia.exe

  • Size

    468KB

  • MD5

    737541d5b664f5c1dc5cd7716cdc81b6

  • SHA1

    73bd0b575bcd1f0abeb67e865c7825c730a32a22

  • SHA256

    0251e86099b655b271e313eea9dc6d198c8aef14431bf56d43b0d8d8b2922e12

  • SHA512

    96e1ad8ccf68f07c8566cc1181daf9e80ab779411e0b2675f7d4ad4e9c32063a9f862a0b5f676e42a00533ed5b514b6dbcfc2c99715ed1794833bb1314fd0c75

  • SSDEEP

    12288:qO4rfItL8HG4A7F9VTq74KYP4sIpYeZzwLatbJ7bWmeEVGL:qO4rQtGGtFvqkKYP4jpxSMlumeEVGL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_737541d5b664f5c1dc5cd7716cdc81b6_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_737541d5b664f5c1dc5cd7716cdc81b6_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\48A4.tmp
      "C:\Users\Admin\AppData\Local\Temp\48A4.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-19_737541d5b664f5c1dc5cd7716cdc81b6_mafia.exe EEE7B5135A2362FAA91A420A3DF7A9267D898A3FAD350B7BE920B1F55EF6DCD3BF4FD5DD46ACC215C51568A75B9A40DE0645A03F9B375CF82219E32276530BA8
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\48A4.tmp

    Filesize

    468KB

    MD5

    f390964a9b10a57a8698c69c59c6e70e

    SHA1

    17d286d229f8d3ab38572a45f950fefef9a0bc90

    SHA256

    11570fb71feb8859e98dad2390f56a803e9bf6062cdce6ba402c72faa85f0cee

    SHA512

    ffa65227d15592145a2201963b4e89880a089a521639fb740881e754cbdbab56aa01f3c46bf69ae25a400a1260e85ca48d7d68e06a48f94bb548af075142139f