Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2024 08:39

General

  • Target

    2024-03-08_ab0a14728492fa14816a1dc6c38cfa01_mafia.exe

  • Size

    384KB

  • MD5

    ab0a14728492fa14816a1dc6c38cfa01

  • SHA1

    24c656999c3c0320522badbf8fc02eb16197b3be

  • SHA256

    8d025181159f687c0b90da6d60ed60db74e583b9ae3e01853f4667093e6b3bbd

  • SHA512

    3895356cafaeafc59bb4bce00b5147078a7cb83c122cee783ee52a263a3758327e785808495884553e374654a5c4a23b7164367f9164725a27ac3a6faba0cfe5

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hHuI9ZmfWyxNiNZ4CYl52kbFJwcpDzkjcWZ:Zm48gODxbzYQyxwN1kbfDyjcWZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-08_ab0a14728492fa14816a1dc6c38cfa01_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-08_ab0a14728492fa14816a1dc6c38cfa01_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\197A.tmp
      "C:\Users\Admin\AppData\Local\Temp\197A.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-08_ab0a14728492fa14816a1dc6c38cfa01_mafia.exe FB809C983A4F56E7708E21B19036C452B7A0B794DA2591C68D011ED555A1054F980D6924D3C9C9440F5451254271F0933D1E51D0A6A31223D4D77F2725F0CC1C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:856

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\197A.tmp

    Filesize

    384KB

    MD5

    c7247507a8b7520c0c57b96ba70fc019

    SHA1

    92fd811c2a0ac169c98b52f50783694556fe2ad9

    SHA256

    4d2b52dd20d57757897587d4b9b44771f5e7e9651dbb881b31cf56bc64356117

    SHA512

    982a754335b1cde10d540d2e3a6ff4d6d474bbb9b4bc8af5c98f13935a081b7d0e075da844b247a8e914a9cacb192586669fc0158a3d0448397dc388d4a4dee0