Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 12:35

General

  • Target

    2024-03-19_6ca7427b30759cc24fc1c29923b303a1_mafia.exe

  • Size

    441KB

  • MD5

    6ca7427b30759cc24fc1c29923b303a1

  • SHA1

    fb2903575afe2d08bf9aadf8965df3d411a77105

  • SHA256

    58fb47739a47ccb15981b119acf796c8adcbd7ec2994850f6c70fb0a92896b20

  • SHA512

    996308c6d2f6bed4871eaef9cc9fd56555648ff65720b0b5a1f3ccadb76c6d2b00f6d8000c19f8de16e0d087dc4213ea9fd5e69cea5f4778d252f64b017373a1

  • SSDEEP

    12288:6i4ET7+0pAiv+vWl4iHG6QT5eEAXYbKzZE:6i4ETK0pD+OvG6rEGY9

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_6ca7427b30759cc24fc1c29923b303a1_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_6ca7427b30759cc24fc1c29923b303a1_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\14A9.tmp
      "C:\Users\Admin\AppData\Local\Temp\14A9.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-19_6ca7427b30759cc24fc1c29923b303a1_mafia.exe 3746A26DDDD29E2694B2E41D89F7CAC97982A8BE420796E7F790BF0AFF5268F9EC63E2C175DC06FCF48471B2ABC1B46CB9F6D4CBE8A609D9D001BE1B7CC5B349
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1812

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\14A9.tmp

    Filesize

    441KB

    MD5

    ef2f303bba5379dc0354ac08b222f01b

    SHA1

    05df2cafc63615778ba23d1f6e4643ae34d1aee8

    SHA256

    be32b9ee87974ca1a8d0b6549be29238e53f8c002c599b0994bbdae38db7f790

    SHA512

    6129952b0b812cda7dcd7ce53b53d9619f5c00a8e60f0a156af49a69a82c0283746d72b8cb685b60b4b8ee1c3c0cb380616eeb28b314ca1704c435911b215e71

  • memory/1812-8-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/1812-9-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2796-0-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2796-6-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2796-5-0x0000000000340000-0x00000000003B7000-memory.dmp

    Filesize

    476KB