Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2024 11:42

General

  • Target

    2024-02-21_00cebaf214e4c40d5ee13ba0ce2db27c_mafia.exe

  • Size

    479KB

  • MD5

    00cebaf214e4c40d5ee13ba0ce2db27c

  • SHA1

    81c2cf5eb9e991b33ce7aebbb7ae93141d7ea76c

  • SHA256

    74708fed9f68f61119d327ff208375b73588ca1318455f63436f72823f34e21b

  • SHA512

    38a58de014fe8a243b7cae5c114a1b55c2545177263de20b308295881b858f0833c470032e681168c4569c7eb7144e891cfd1ba1b2d26d1e5a986f8e710b4fb4

  • SSDEEP

    6144:b9EyS4oMxIkjxcWqHtg88HARRxSB3Tg4nAzqoDl2cmheGA+Q0Jzhc/gR3gT5uyy5:bO4rfItL8HAc5g4A2U0JKpTjPeGK75UO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_00cebaf214e4c40d5ee13ba0ce2db27c_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_00cebaf214e4c40d5ee13ba0ce2db27c_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\4B81.tmp
      "C:\Users\Admin\AppData\Local\Temp\4B81.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-21_00cebaf214e4c40d5ee13ba0ce2db27c_mafia.exe DF8D8F18A113D5A16570A137C23EB086E056BE4DA486F3257C185C29BD59BD19ACFD3C8EDA6A704D30797FA3D8DBD738126DC3E3411D52478164DBFCFB9C712C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\4B81.tmp

    Filesize

    479KB

    MD5

    a72c75019c5619491675b391e9f45fab

    SHA1

    defb1692ff049b51408792eb643384b96c9beab5

    SHA256

    01a458842f548123e542a584125e851833c0c68a835192effc8e0b358d0a849e

    SHA512

    42ebe1be7d3a2b88672f47b243687117dc0fa0c87ab1bc0cc8facecfc5fbb29a46914a4c241b6df8fb9b0e966a762ed17ca47ad79e708f4b4d55112b0e7575e2