Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 18:33

General

  • Target

    2024-03-09_2fb8aa0b5da25f4469119e9984a7ab10_mafia.exe

  • Size

    468KB

  • MD5

    2fb8aa0b5da25f4469119e9984a7ab10

  • SHA1

    f272fbe8f1c580c665b398fe5fd924ac71611b74

  • SHA256

    5f6bc216d793c5109192d3437c16959f3e21450794362cfa6edad7c0ad0ed574

  • SHA512

    8f3cec028cc8e3b40c5485e964cd29127d329507d42cfc0d35e3454249a2fa5a85ab6147d894acaa44b16947c907bf986af24b272d057e70e33b17282c7a4c88

  • SSDEEP

    12288:qO4rfItL8HG2OjeACFpUN3UM+S8vEYxpaWtN7bWmeEVGL:qO4rQtGGZbEM+7/xsKNumeEVGL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_2fb8aa0b5da25f4469119e9984a7ab10_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_2fb8aa0b5da25f4469119e9984a7ab10_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Users\Admin\AppData\Local\Temp\932B.tmp
      "C:\Users\Admin\AppData\Local\Temp\932B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-09_2fb8aa0b5da25f4469119e9984a7ab10_mafia.exe 40710E3AA17EF473C0402994BC3B07107B10421017A5D9C70C2454D3CB8BD6F103D06CC4F0604A60802C550FA31FD64671ADA19418CF63520C21C13C2A08A043
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\932B.tmp

    Filesize

    468KB

    MD5

    3beba925c9fd28648c5c78117405df7a

    SHA1

    ea7305f30f6c4e667967e9fb2bed1761d27192e4

    SHA256

    35c61d119b950b51849cadedefdb255e7916c3558c27517322f1595996f10f79

    SHA512

    7598c813a656e302853daa186c9bfff80c978ba870bdc7edca7352ab7f2978fd172fc084b566f6493c46e7a163cb0a26c6b91df0c7c4cacd74e74e69a4dcd7dc