Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 12:56

General

  • Target

    2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe

  • Size

    444KB

  • MD5

    e01445aabdc0ecec6c2e299ada524ec5

  • SHA1

    6f12af8074804e05204cffc0d52fb1d9aef0cc68

  • SHA256

    f11ca86e8dcba8ae3884ba52bbbd331b8f917283b8aa1aaa89ba577a6c1e2cad

  • SHA512

    deb549ab9d4d48f4f1dac9e82060ec09e82536245141755ad1d8666f95cc7fcaf6e10c32410aebe77644f54f78b5c56baf64bc728c0bc112bd33fcbd8f78bfb1

  • SSDEEP

    6144:fFrJxvldL4c5ONK1xgWbd1s79+iStqw7FZEwo98ZCvQJBax5hOds+BtT5B1cYt1d:Nb4bZudi79L4FZujcoKb1B1Bt1MZ42A

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\7658.tmp
      "C:\Users\Admin\AppData\Local\Temp\7658.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-26_e01445aabdc0ecec6c2e299ada524ec5_mafia.exe 646F027E89981FDB7DFF86DF31E9066882A819F4EA1BB1CC7661FB7EFE31A3C81ECDB20CBA6D2F3296C2DF0EC810A35488ECA67E8F8DF9DF2D924682E118419B
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3008

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\7658.tmp

          Filesize

          444KB

          MD5

          9f959adf71a0fb5a146e024f4f0ab4e5

          SHA1

          96ecdaa07f965da566c62dc8ef450c2a20b658a9

          SHA256

          e185219ebafa70b4ccdf80c8515c401121118b5dab52b269c33e33e1399a29ce

          SHA512

          0ace13552b93946c722d87bf4983edf7d05df29b3d88c9541dc922017109d077e892809bb337822ec0d038c04ab1cdc4eb994804a8ab6822acfee1f55477cdd0