Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/02/2024, 03:28

General

  • Target

    2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe

  • Size

    486KB

  • MD5

    2957402a7d5c3548a74ad2ffdb84f7c6

  • SHA1

    fa6deda283af78874ad5502d3e98403abd711e4b

  • SHA256

    db39bfb5ade0a5ab32ee1f9884c07affb281acca6b577416713a6dd60a463e7f

  • SHA512

    eb4f213e002414083fe8a0e080c5f4c3b63bd43c4c88605bb3b5755393f419bb756a96d7d003429ef63a33356e25defcfab85447ca84dc0ce256352f465ee8c1

  • SSDEEP

    12288:3O4rfItL8HPTKCTYYZf2ZhBrRU1oOqDt7rKxUYXhW:3O4rQtGPTDTvZfShXOu3KxUYXhW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\14C8.tmp
      "C:\Users\Admin\AppData\Local\Temp\14C8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-29_2957402a7d5c3548a74ad2ffdb84f7c6_mafia.exe 5D59FE900B05C36B9C76F19BEC91555D8C065DF04B3074890B20E96C6D6530C9E8475A24077267150D45BD6540A1B840AF7D20E8EC0AA702F341AC10A904011C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\14C8.tmp

    Filesize

    486KB

    MD5

    3b2dc6cdc92d17cdec81b5c1ed1adfde

    SHA1

    3c3aa2d8173593b2d3bbb14f9c278abdfb5d6712

    SHA256

    a41fde5a49a3b34993ad28ed64e7601de18b3813d072696325af757867b67d76

    SHA512

    09d5ea1c15ebeee5cb29bf43d6021cfa465e071d29bc39b8830c16fb13a22b59639ae5e9732eedcd5d6b577744106e87b7740b6f987b9839fced89a45e0efc98