Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 21:36

General

  • Target

    2024-03-14_92447f3295aedeb881c23b048bf93121_mafia.exe

  • Size

    433KB

  • MD5

    92447f3295aedeb881c23b048bf93121

  • SHA1

    1729ba777a1adf123acc6584e2cd38e25fc200b3

  • SHA256

    462b03d84ca8b82ee20f1169723444e1f43c9aa382b9767b5c110f4cbe7e14d3

  • SHA512

    773cb74fdc44393bc339d06ef1271fd6496dc3ad0ccf31c268d527c01018a55504035185cca5994188f0279b2e7b43d307b29b586fca885c7a0286bbb9f00271

  • SSDEEP

    6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvhGBb9Qa8g+tupc7CF8cObwl78jpdjTvGN78:Ci4g+yU+0pAiv+iBb9tIoojPPcxyqIzn

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_92447f3295aedeb881c23b048bf93121_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_92447f3295aedeb881c23b048bf93121_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\BF2.tmp
      "C:\Users\Admin\AppData\Local\Temp\BF2.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-14_92447f3295aedeb881c23b048bf93121_mafia.exe 400C70B5853FF8E672F2C0E2B1C0F34E30B94BE724A548D139EE801A40155C668E8343A272CA0C9E738508C020E44BB24ECCE234735579F78188CB988D14CB93
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1592

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\BF2.tmp

          Filesize

          433KB

          MD5

          ee47ccdefa78465c74f59250084b4935

          SHA1

          85a1b4aee2d09dc1def7705502ec313a75bc9da0

          SHA256

          6c0e984a6245c914953532682954e5de7bf68a69d65b4a1d79530bd16d780324

          SHA512

          2465bcea8e9a455d6531411fb989778465f548aaa19fbfe8806f893ae317aad8af69cdc815637111c4aa9cdc06f76c9a97d339f37be0547dd4c5a7019bc16288