Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 00:47

General

  • Target

    2024-03-14_c2ef6b0e4083707d8030fe454c3a79db_mafia.exe

  • Size

    411KB

  • MD5

    c2ef6b0e4083707d8030fe454c3a79db

  • SHA1

    4c9625c7063c52eb8652ed60d1fb60b2320050f8

  • SHA256

    7f1bc53b90d12d03f722a115c1400dbbe1126a81017fddf3cd69c1c4f76c1260

  • SHA512

    1dc785c78d01d3ec20cfb394c0f1e8ba63944524e4b8c9ccae72c0ea55ff39ebdca3b66b320907177a33deab4e1a8750f7df94be329c7701d66855b996231d9c

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFr2D8Vcw+8K6IWotDpk7h8qNhHxyw/gnP5D3sqHI:gZLolhNVyE9D8VcvtDpo7zzqHI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_c2ef6b0e4083707d8030fe454c3a79db_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_c2ef6b0e4083707d8030fe454c3a79db_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\8A8.tmp
      "C:\Users\Admin\AppData\Local\Temp\8A8.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-14_c2ef6b0e4083707d8030fe454c3a79db_mafia.exe 7BDB69CE85A922C0269C643C76A6C94239C293B9A02DBDD95115A7AAA3F24DA48DCE7901C083F108AE8755C16D8B2F8A057AA5E3C5E012D91CC0340A94252840
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2936

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\8A8.tmp

          Filesize

          411KB

          MD5

          b07efc5bd778432d43c2b3f3aec2c7bb

          SHA1

          2113de32774cebe753e4d82ad3774630c587547a

          SHA256

          c48604ba986ee2cdb7f21efb25b458edb0ea886e117ef17d9b0e8e16d4bf1bde

          SHA512

          cfb536fcada070cf22530dba359e09d884d4e1622693057b0a0bb8d49bd3816d3b80e580f642d1bfb226c835ae93811313f61502d4985bd36925157b7776b25d