Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 08:28

General

  • Target

    2024-03-05_37aa5403fce34cedb13b2fb6ff4caf78_mafia.exe

  • Size

    486KB

  • MD5

    37aa5403fce34cedb13b2fb6ff4caf78

  • SHA1

    b3bc3c61825386927d120441fb43154a6113d5ae

  • SHA256

    2619efb4ac7967f06682c363fd7e6fbd3d6766488e1ed30fc51c78723d5d6fb2

  • SHA512

    a2e02077ec5cdfaaf4e5377513623407c381f3feb7a67f876369c28fdfb8311f0fe1c199b5fdfe8bafea44364006a522e6ed3a7868507e8c6a2fa714d60ffa4e

  • SSDEEP

    12288:3O4rfItL8HPr+RgL7oqWo9eiVwpZX7rKxUYXhW:3O4rQtGPSa4cHVEZX3KxUYXhW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-05_37aa5403fce34cedb13b2fb6ff4caf78_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-05_37aa5403fce34cedb13b2fb6ff4caf78_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Local\Temp\71F5.tmp
      "C:\Users\Admin\AppData\Local\Temp\71F5.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-05_37aa5403fce34cedb13b2fb6ff4caf78_mafia.exe 31BFE4345BFE3C7198E07B0048146F1F967AE8D867B1618FACC32BA981283D260DF09CB4AB96D08127A552284D53C48D9BBDBDD60BC327460E2F692C08478E60
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\71F5.tmp

    Filesize

    486KB

    MD5

    a03820da037ed66ce24afe1d02673b2a

    SHA1

    f18db1b9d2a25192e0ad17423ebe98c448ddcced

    SHA256

    6bb15ba40d6c8fa73631f9811225755f2ef55ecf65fe517eb5828de7cf37845c

    SHA512

    847ad303235377628b09de55f533a03e052399ebbe12e6a39b72ff8a7d16ab9d818836b9b15148e1b5d7bd1ac899ed56a7dff33e8d0c35b5b65009664930831d