Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 08:49

General

  • Target

    2024-02-22_cef43342787c58f617167e8d63fc499f_mafia.exe

  • Size

    428KB

  • MD5

    cef43342787c58f617167e8d63fc499f

  • SHA1

    3debf0a5f784abf83c870accfdd2628486dc0c34

  • SHA256

    5b924aa6c4f5105a5c212b3c1d3c4e9bdae25e29f15281908a3aefcb4a65e5fc

  • SHA512

    a62da923a0d804b6a155d8d7c17b95224fc4be5a1f08cf1700ac74476155c6349e1ac4e52c675762588dae910a9a79c8b9c3421e201f9fc3af3667d034cd601c

  • SSDEEP

    12288:Z594+AcL4tBekiuKzEruvLZPA2gYHx3flpUPFnjXjZl:BL4tBekiuVruTJpHx3ffUtF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_cef43342787c58f617167e8d63fc499f_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_cef43342787c58f617167e8d63fc499f_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\5B69.tmp
      "C:\Users\Admin\AppData\Local\Temp\5B69.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-22_cef43342787c58f617167e8d63fc499f_mafia.exe E0E915E4A741F9226383C3C17B62DB52017313BF0813C529FA993E5D54C84DA2227908C191617D2F3FE5B47AAA46567085B77DAC8471B2B743D0F4F44EBA07DD
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2912

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\5B69.tmp

          Filesize

          428KB

          MD5

          e0d78f51d5edc96b2f1a9f2237509b5f

          SHA1

          15e71bc95f85bb27606556717c4a12aad07da974

          SHA256

          ac39a4e2d5bbf5d074333a8905ff8f7391e499d3dce6b25454e8912f41434589

          SHA512

          e3f5eb636d82ea5f7fd123ffac39a392f3894e8843dec56c77b3988298ef657a4f528bcb1f6aec6f79ca74d38247c289a10daeae6dc32eb4a00e0fc6b869fc62