Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 20:42

General

  • Target

    2024-03-19_b7bdaf947e7ae473c14a3c9a041a6e3d_mafia.exe

  • Size

    435KB

  • MD5

    b7bdaf947e7ae473c14a3c9a041a6e3d

  • SHA1

    9f02875e9972dff4ee98efa2f7c0755ce54263a7

  • SHA256

    db70b367828f53a3fb13c158119d9a5a5b9c7836cc2c14fb108e3a6074fe7cda

  • SHA512

    d94f2593f5e19a514ca82c458731b3831542bd9bf16db1695b58bccbcad7ed5119af2f9235332c15c4919fb6e02b3a22e3a53afb57c8a287af456e8312021946

  • SSDEEP

    6144:fJvyW4ojUnQjx4qePix+qXQjBYhbzLXvN77hplN+m7UrpO+h2dbagUw9J:fd4x+ePixnXQj6bXV77hpGmMUbaLwP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_b7bdaf947e7ae473c14a3c9a041a6e3d_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_b7bdaf947e7ae473c14a3c9a041a6e3d_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\495F.tmp
      "C:\Users\Admin\AppData\Local\Temp\495F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-19_b7bdaf947e7ae473c14a3c9a041a6e3d_mafia.exe 7C3F7392D90742A534B847F127E00C951F6E62C3B9C03D2409303A6B0430BA35B9CA17E64BCAA44308BB2983CE9273A74EF65EF0CF4AA9F0069F88D3E5E2CEDA
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2224

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\495F.tmp

          Filesize

          435KB

          MD5

          642c9ac761579c7861f80ca208dca7a0

          SHA1

          6c67c3bde2de994480d2baee4e34e74dd6815d84

          SHA256

          df094921ab0fe2b39515afec41dfb72256bea6b23470c42f8b84074a746df793

          SHA512

          cb3387e354b4a552c3fe432fdc80918c5517f9c98529655657d59ea50cbac1d46e45082da7afb31e3b17dcc4cbfefdca75a1949d1f7dadbd15e4f355319e5f18