Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 12:45

General

  • Target

    2024-03-16_ce24bd16f05fada69ee820823e0eae2c_mafia.exe

  • Size

    486KB

  • MD5

    ce24bd16f05fada69ee820823e0eae2c

  • SHA1

    2a7120878314d512c66706532c7660636c3967b3

  • SHA256

    6306154c5af865e2d43d170caa955d272bc1c4fb42855a8c5d09c815d539aeb6

  • SHA512

    72fb23f1310811951820a97d7e842474ddbb44da35034049fa9d4898b7c0b38819399bc80208a3101329989b824f473d1958518d07ef3e034524da144c3dfc23

  • SSDEEP

    12288:3O4rfItL8HPU5GBzoEq2CNuckVqTS8anoVm0O/7rKxUYXhW:3O4rQtGPU5FEq2MIqTwnCm0O/3KxUYX0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-16_ce24bd16f05fada69ee820823e0eae2c_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-16_ce24bd16f05fada69ee820823e0eae2c_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\1046.tmp
      "C:\Users\Admin\AppData\Local\Temp\1046.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-16_ce24bd16f05fada69ee820823e0eae2c_mafia.exe 0452D493E7EFFB98217B1CE1E4A03F579374C0A86BF32FF89989BA264DB0502F7BB31709251387F6BBF1F424D271355F3C6A7FCBF2F3AB7538A454C862E0B2DA
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1046.tmp

    Filesize

    486KB

    MD5

    7b6b9dce64e00b9a345cb8cb3848ab16

    SHA1

    7741605bdb43f2b30c3022c8fbbb8492b951a7f4

    SHA256

    075ab38d831005bc87f6ca665494262f532f07478b0ac06bcb9d912bdd185085

    SHA512

    c2f64474960c58d1161388e7cfa1048655a77e745d263ba894b3517698d6986359379ae85f566812bb35d989afde34bc25d52e86b761ab2bac6ab922ee31153d