Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2024 19:37

General

  • Target

    2024-03-08_7bfa8627be54e825d5f355b0ea77444b_mafia.exe

  • Size

    433KB

  • MD5

    7bfa8627be54e825d5f355b0ea77444b

  • SHA1

    3685d82b3c61b910e89a2eb3c4884dc2a777a8dd

  • SHA256

    b99f0690ab2113d857aa42d102c3ad7cab85e9763a706254a7a36ff16564bdb6

  • SHA512

    c1c2fdf997ac1c646f4e126bdc862848bde7f4b3ee9f2668369c577df6cd82d375e87e28fdbe9ffb97e460e58b2b878066462604b2b901adda07947d9712dbc7

  • SSDEEP

    12288:Ci4g+yU+0pAiv+NyxQPZ+V6820+2rkqT8vboYXn:Ci4gXn0pD+bx+Al2rk3vkY3

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-08_7bfa8627be54e825d5f355b0ea77444b_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-08_7bfa8627be54e825d5f355b0ea77444b_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\1D31.tmp
      "C:\Users\Admin\AppData\Local\Temp\1D31.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-08_7bfa8627be54e825d5f355b0ea77444b_mafia.exe 64004195C8AF363A0F96F0693327DB63FF63B5AAB0494FB2FBC96F88806146DEEDA8F13959F66F95D59EF662CD1F1E118466F652F8F5343D1E1A7BD27E46BE01
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2604

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1D31.tmp

    Filesize

    433KB

    MD5

    ed9f2886adea08c2a764c9faf7df7059

    SHA1

    61cb922ac01305325fd613890cb9e284d49f595a

    SHA256

    5fe410c9bac7721c846971221822a69ece33a5318626caf290397b80abe87c1f

    SHA512

    ff7f04289d44271aa49bb9f066279dc44949a5c9d7b44737474afa10f249188b60f5e3d065aebee1eb38ca18001f652cb0576fa9fbd4b5a3401db0558e99e75e