Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 04:53

General

  • Target

    2024-02-28_55c458e4ab405a4f3f30aa53d5ac21fa_mafia.exe

  • Size

    476KB

  • MD5

    55c458e4ab405a4f3f30aa53d5ac21fa

  • SHA1

    f76099333688a181da1faaa3c77f1af3588c0814

  • SHA256

    df33faa09c815117323e847325144cd5a6320296a6415fee06b967ba4fce6cbe

  • SHA512

    61f5360ee3de9745886bcb62eda818f6635fe65930330c578c6b03fe00903b7e1e1ecbd0b596c9974b716b25ed80482483b9b4c0cc4b51d6451e23b9b1bff8f0

  • SSDEEP

    12288:aO4rfItL8HRJhUYFCLoFe7jZy8aVhVwNPrMmSjJE7K9wlsDpVFd:aO4rQtGRL0LoFkNbaUVSj++9wlsDpVFd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_55c458e4ab405a4f3f30aa53d5ac21fa_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_55c458e4ab405a4f3f30aa53d5ac21fa_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\4E20.tmp
      "C:\Users\Admin\AppData\Local\Temp\4E20.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-28_55c458e4ab405a4f3f30aa53d5ac21fa_mafia.exe F395617E1836DFF2EFC9D7A2AA67947C95D5A87D1A8F5E8BADBA9D5AAAB048C15D28B8710B7B6E44715B325D043A9C045F12A2A74210F0A2B6F9E2741468CBAB
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2200

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\4E20.tmp

          Filesize

          476KB

          MD5

          b4efedf2707435da4e02f531805c03d3

          SHA1

          f6140cbeb6dd9d9a3a3a739537ba830cfd49bc11

          SHA256

          01b8ea36096192778b9b210c2fee71d152f431305e671426dd12fc676a9ecdad

          SHA512

          45a1505b6efb1cec05cc74bf49ba7749e1e919c56add001fe5743b060846f234ab0652e43c94116ea03d8712ea17cc5f69a4ab779dc916abd5947722da25db80