Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 15:41

General

  • Target

    2024-02-22_752bd122c3737b01a4ca08563f55b39e_mafia.exe

  • Size

    413KB

  • MD5

    752bd122c3737b01a4ca08563f55b39e

  • SHA1

    ff94e1a6e06f16a902961dcc0e40664e7b9e4dad

  • SHA256

    e16a8a4d08c57d585bdbfbca9b1207dbfc12d229ca4b1a1583f80f715f1b483e

  • SHA512

    20241a3de85fa15c8ed75ee1212e14ad1e8cd79af160c96bba8ff286571c8b8ae673e8fa276fc650b57d8f2d7626881c145519c546b77bde01534ab816d38aae

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFc6gixSBAjHLtM11ooLpjyqHg:gZLolhNVyEJ6gcSWHZM1LhyqHg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_752bd122c3737b01a4ca08563f55b39e_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_752bd122c3737b01a4ca08563f55b39e_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\5052.tmp
      "C:\Users\Admin\AppData\Local\Temp\5052.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-22_752bd122c3737b01a4ca08563f55b39e_mafia.exe 4EE1A29AFC2F80E913B6F9062203125260E6C314C8D6452EB867330B56B5A47FE05D490EBD619BF4E4866F62864E7C40297B068C32F610557B0031EE920E6739
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2312

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\5052.tmp

          Filesize

          413KB

          MD5

          d88460807caebaf7f647992619678c2d

          SHA1

          34c3c3ecf3c3babd23586d50f88e5148178cc485

          SHA256

          0113de348196ad78308bbaa7c332d19198aa67f10bc6c5148e8e8076437c3432

          SHA512

          a90963e90a66298b7beb71a99e79a8faf45c3296176fb666575f69dcecb403ab6476d69d38216ddcd2e0f2925f700d7818b4aa4ec3cba7e558bde3ee02274425