Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2024, 12:32

General

  • Target

    2024-02-20_5da31655f1cba59e82ecc856905f7770_mafia.exe

  • Size

    468KB

  • MD5

    5da31655f1cba59e82ecc856905f7770

  • SHA1

    982fb0eba4e5f5769b5e157a7438fc3d5684a068

  • SHA256

    753471024fcad693449198b01c676ac0fdee5beefb0e628ab174e7ed3331f0ea

  • SHA512

    3e231aaac253976c240c6f585be3ca95c4f4be50a6b0cdc847505d181384855709ce1476f4811c62904b31970999f9394a17e56938985f0f28c071c31888c7c4

  • SSDEEP

    12288:qO4rfItL8HGW12MiPfFQJG7Od3HgvuizTf677JO7bWmeEVGL:qO4rQtGGC2MiPd836zTf6lOumeEVGL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_5da31655f1cba59e82ecc856905f7770_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_5da31655f1cba59e82ecc856905f7770_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\11AD.tmp
      "C:\Users\Admin\AppData\Local\Temp\11AD.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-20_5da31655f1cba59e82ecc856905f7770_mafia.exe 53882AE9FFB6A0734A5BAF679358BF8D2CCDA2C1A7E724FD4AAED36D5BC67C0DE6FDD56F3CF115290BF7235BB0C3C46DE8D4E9A1FD7B10BAA85E15BA38277DC5
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2140

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\11AD.tmp

          Filesize

          468KB

          MD5

          0ceed31ccd99768e15179700ff16e919

          SHA1

          b33cb3fd4813b23c78299910241ac940ebb11f04

          SHA256

          ce2050d73ff41558dda893a6f7f5ff75a38d4de3df52882a220b58d5126a1a82

          SHA512

          ef75c64538798e33679fc47f2c1bf6a5a060804a0e44d8dc6bbb0b91540a953d683e26744ce5cb6cbdc9201efb1896dd3cd81f44ff0fc69e3638c709bf7d6a8f