Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 05:51

General

  • Target

    2024-02-22_87e5ba0d215a2976c3f58d5cb008e7ca_mafia.exe

  • Size

    476KB

  • MD5

    87e5ba0d215a2976c3f58d5cb008e7ca

  • SHA1

    91f3e71bbc9790ee0a3c1ce8dae3d788772c1a71

  • SHA256

    d01200e96c639eecd71d39cf9888cc1fc63d06e2a68e9d2b4f2f4798171c417f

  • SHA512

    13aff43123d5b7b12d8a7a8c675c177b8692e9758ded93338a28929e831a1e07767837af932c0806f0b17b6afc8bf5f1143f8e968286779cc3c2bf9213d9ad7d

  • SSDEEP

    12288:aO4rfItL8HRmmBH2IzMEeurO6iUI7K9wlsDpVFd:aO4rQtGRBH2qsZ7UI+9wlsDpVFd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_87e5ba0d215a2976c3f58d5cb008e7ca_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_87e5ba0d215a2976c3f58d5cb008e7ca_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\1822.tmp
      "C:\Users\Admin\AppData\Local\Temp\1822.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-22_87e5ba0d215a2976c3f58d5cb008e7ca_mafia.exe 7F1C7FC7C170632E6E241C2933D393308641E9DB400D9FCE4848DDE2B607337D928B02BC1535280EC7838E2613E739D09EDE0809955FEDDAE14644F6D6FD0070
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2464

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\1822.tmp

          Filesize

          476KB

          MD5

          64cb62b2c5d1c3a2e833fc20b8f03593

          SHA1

          dd72bea6c367d88002976d4ac48d70004871ce9a

          SHA256

          27c2c3e68503490713b0650a0b04432e43c62f662f72da7c2acb134af2aa0a19

          SHA512

          25a1f0e9a4d51e1a2bcfab103d820ff35d26f20e2b76b2657047a863d4ee2a615c6012da454d834ef8f4b45081a4a1e2cb2a4a6926143fd1bc1a3f61144c9174