Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 12:43

General

  • Target

    2024-02-28_c756430cd9fb634942567260ba1d143a_mafia.exe

  • Size

    411KB

  • MD5

    c756430cd9fb634942567260ba1d143a

  • SHA1

    14aebf8b453416826e968dad004892b85ee159d6

  • SHA256

    a795d2958f8f7d99124d2fe89fc0bf445d04bc6541de50e86927e09be07f343e

  • SHA512

    9f9ab6622ecce03e5973d6215babc622d3e0f13e3391c505802b3218200c426b942a9daa0e7c6e06dfd67c8d471ed81ba9ea09e0735dd1a5d3dde84b04f6c683

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mF3FbtVqD5cYRY5j65r0Mp3qHI:gZLolhNVyE80DTRY5eZ0oqHI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_c756430cd9fb634942567260ba1d143a_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_c756430cd9fb634942567260ba1d143a_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\909C.tmp
      "C:\Users\Admin\AppData\Local\Temp\909C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-28_c756430cd9fb634942567260ba1d143a_mafia.exe 9120417BFEEDCBDB59C930EF6CF5FA6CBBAF5F141C4F1F1A2989D6E2970DD8698D1DE37B3A6C1C903619F2DBF2CAE681AA22619977B319C8DE268B6A8D75AEA8
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\909C.tmp

    Filesize

    411KB

    MD5

    5f2243b60be579a42f4361761c9f522d

    SHA1

    ac12d8cae237915c39598f317d105c9a8d269838

    SHA256

    119df3689887ac4ee4921109adfdaa98781178a580cfd1cb27aff529bc3387e9

    SHA512

    400c97c65b99b7d2d7695c5c6175eabaeccc0e5b7b8f79e56e454f1b654cf847a7efe09ae58fa2de3ed2597bc3fc9dc23aedbacdfaf6ee5d63c17ed5110614c8