Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 06:34

General

  • Target

    2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe

  • Size

    412KB

  • MD5

    5bbaa4f10de58b3890f0c6d5ec970f52

  • SHA1

    ba2e68d088ddc9c223afe550e303c80b6b7f25fb

  • SHA256

    27d0f7d4e185ef7e03159a6dd933c5aff5ec7a39816433631152fc0c3f5cf040

  • SHA512

    23dbf80b8366dacc8f852f3df84d5d046aa5a5e0fd8916a9ed135fff764324a1ee6f67e29920eb8c6fa2e8a295a62a6c0ca2d528e1ad7847aefc37db63489ac3

  • SSDEEP

    6144:UooTAQjKG3wDGAeIc9kphIoDZnRsIaEqrtS3qk9qofXozw4VzFjRPIDhMCP:U6PCrIc9kph5ehDkHPoFTIFh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Users\Admin\AppData\Local\Temp\8D90.tmp
      "C:\Users\Admin\AppData\Local\Temp\8D90.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-24_5bbaa4f10de58b3890f0c6d5ec970f52_mafia.exe AC8E2916247258795B931A16FA13ED23951D8327EAC6BA4250CC3DB679FE174F88E7420E2C7E36E7DC4B116C75E96931602F7685EE8AB0BB01071EC124A78618
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8D90.tmp

    Filesize

    412KB

    MD5

    3f67c2c8017875b2a8440ea0d2dc7b65

    SHA1

    a027247a3c063796b579dff6decc182cb2f15a84

    SHA256

    13ce11716a60917e140e67ec1cfa785c141bfadc2caa26dc73d4aa1d12d1d152

    SHA512

    38be2f8bfd6efbf2a789148091b9fff01aa5f7598a14bea7609b8bbfa8c46ec4de494cd45ca7646842cadf5a925bb6dd2f8c0d164b56edfd51678a3ce9881e1f