Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2024 02:32

General

  • Target

    2024-02-22_613c251575d9acc520b388fde14ac550_mafia.exe

  • Size

    479KB

  • MD5

    613c251575d9acc520b388fde14ac550

  • SHA1

    91d4df44cc78396125dd7a87c754c29451d16895

  • SHA256

    c3f659db9fedc41e9752f0489c0dd6e9b9d85ad4258fb4917a9fa867f6998111

  • SHA512

    a0418d51384c3c3d2f277148dbd80509afb36dcfbbee8df6d45a4204ace63e5c26b123c78c28b629fbc90903d016db90e50fec722d4a511bc4bcb778fb3abb9d

  • SSDEEP

    12288:bO4rfItL8HAYiv97wAYp8JSdc2MZn8amXom75UO:bO4rQtGAYiv90cJSdtmmXtVUO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_613c251575d9acc520b388fde14ac550_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_613c251575d9acc520b388fde14ac550_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Users\Admin\AppData\Local\Temp\17B5.tmp
      "C:\Users\Admin\AppData\Local\Temp\17B5.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-22_613c251575d9acc520b388fde14ac550_mafia.exe BAD263F17ED5C91DF54728B1A5397D78FF4E5C58BE52EA598469BE2B2676517097E54BA83A6CE1637276FE7E08A446701FF095F788F041F0C4EE324C7D5C3E34
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\17B5.tmp

    Filesize

    479KB

    MD5

    5e794a6628bff04f078c7dd75bfb4e82

    SHA1

    5585f3f3fb0ff38606f3eda6409f9171cf88b4a4

    SHA256

    9e0a38974162a0e642cebebc74f212d442d7663875d5c6d7b8162f2fc8a24b60

    SHA512

    8df9c84ed0fa1d89925c2db6f38dcd7799e0198e3497ef082ecd509e0a42f945433dca0ba8470b050c155bd779c4b8fb8d03f5a482482cf7c3c083a91770d109