Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 08:29

General

  • Target

    2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe

  • Size

    428KB

  • MD5

    7fb42ed6bcb3f407347e0409ce476b99

  • SHA1

    d1d2bddae38ed9cf4789ebaa0e4143c3d70faa99

  • SHA256

    fb82fef11f8fc22ef7106e40b698481294bcc04f1a55d861139d87702ee9841d

  • SHA512

    d548a689731c33df37a52fad585176b0a7d365bcbde2883a91eb8cea92af1d81dfba4f8707deb3061f4da18dcb2d46bb990ac6e023213df1547b6aadad4f39fc

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mF1IPq/rkKFbB2IMZ9neokf+j2idOQXx3PmQo8cwcO:gZLolhNVyEHPafxcHymXx3PrcNTqHR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\144C.tmp
      "C:\Users\Admin\AppData\Local\Temp\144C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-25_7fb42ed6bcb3f407347e0409ce476b99_mafia.exe 119941EDDDB80775D4F858009C94114F87935A3D6278758BB36A2315C0ED8E1A694E0D59194AD6F136F565F76BAD78D050D745EC68699EB0FD6F78F1213240D5
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2588

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\144C.tmp

          Filesize

          428KB

          MD5

          4123690bbc789ca67307a07cf98b3c1a

          SHA1

          4ec81ef7184e8e5219d299cde7c0fb5ea22e625d

          SHA256

          23aeb4d70f3066446d6eb53c4779345202d36f749f0f245949cea58723a83925

          SHA512

          c1a74ed1b380325f08d25a5f17203e4062236beecfe23324403a126d0697e73f1584d05a435e22698fe0951234bdcae8ff159e5c3e8c551af7f9628183fd43c3