Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 13:26

General

  • Target

    2024-02-24_123840ff07ef7909bba56741ea434650_mafia.exe

  • Size

    412KB

  • MD5

    123840ff07ef7909bba56741ea434650

  • SHA1

    51a292f17578d166c0fef05f448e2e374a448232

  • SHA256

    f31cdfea5ba9eae088e035dc8e3042779d49ec4de94941856a559a081f0d53f7

  • SHA512

    650311205c6a26584a8fc5f1223f3470780fb47ffead939e9d61a0c10219d1ab5bdc5df0c21a008db94e9362bfcc30de6cf67f889ca9324d488488aa1598cd74

  • SSDEEP

    6144:UooTAQjKG3wDGAeIc9kphIoDZndpsiDL5NlN5NQaSfhqFyg79564C33P:U6PCrIc9kph5f5H7lNpMh+yg79U4C3f

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_123840ff07ef7909bba56741ea434650_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_123840ff07ef7909bba56741ea434650_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\AppData\Local\Temp\39B6.tmp
      "C:\Users\Admin\AppData\Local\Temp\39B6.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-24_123840ff07ef7909bba56741ea434650_mafia.exe 397BFCE4D7EDFAD18E349C5D31A9170C0C4F0244859601F35A7C6CBC3E65BD583B4A2157133F9B6399E0559F5A5A3F6C7CA1C16B74BDEE659EC507FD4C847ABA
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3044

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\39B6.tmp

          Filesize

          412KB

          MD5

          bfc1f5b72ff5a7af49fc8e3fcd30f54c

          SHA1

          e72fc87556b0d744fa43450794e90f1c7700076d

          SHA256

          7382b8c13406346ac317ee3132c9126032995a3c63dd6fa3ac2a20401e70d6a4

          SHA512

          63bc39488875e85149945af54203cd1694d6babcd200c3aff115569258e5986e2b615c1e7fd36945f8042bbe61cdfd99e79ecf17191c699baedd51ffb088ad79