Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 08:40

General

  • Target

    2024-03-27_b73960db0f36c55342168205f2551b10_mafia.exe

  • Size

    448KB

  • MD5

    b73960db0f36c55342168205f2551b10

  • SHA1

    4707da88502e4dd3fc2031c4143282f631cc9e51

  • SHA256

    3df5640326ed5fa58cd2c3411c5d40e31dc20feb2b8170b4fb894a267a05bfd0

  • SHA512

    dc7aac93f69b65d3aaa9ce2c4c2483d3a34ae595cd30f72f2d55f164ebddc493763d1e37a6fffa04a049275b11343164112ba61b7f5feb2864222dd5546c6eee

  • SSDEEP

    12288:lb4bBxdi79LHKwwI2OehEN2W/4B+n5VcS0jA4:lb4b7dkLHKnIZ7N2WgBETv0b

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-27_b73960db0f36c55342168205f2551b10_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-27_b73960db0f36c55342168205f2551b10_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\71D6.tmp
      "C:\Users\Admin\AppData\Local\Temp\71D6.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-27_b73960db0f36c55342168205f2551b10_mafia.exe DD79E9F3DA45DCB098597C29D6729A673D8F93230DE492E1C15BD79D5A754508974FD4752A899B4887B6C0FD8ADB81093059C027191952C35E9102C99472D12F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2144

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\71D6.tmp

    Filesize

    256KB

    MD5

    b9457bfa3a667e4d06a0c0744b32fef8

    SHA1

    bcdc00133414d0fbe190cbf0045ff09b699937d0

    SHA256

    608060b44bd979fdc4392bbd0096def42626e653b81012956d05d53dab115589

    SHA512

    93d2338a613ce67eae58b329f9ae384e531aa745f3a5f2ae44fb02f64aaf12f63295967505ff1f4a6a1c166009e945235d1aa486cbdea1992db12a2d00e50619

  • \Users\Admin\AppData\Local\Temp\71D6.tmp

    Filesize

    448KB

    MD5

    f3dbc0fe5c09586761d759a24c66bfc4

    SHA1

    212b530d9f32b74584217426f6842b86fcafd28b

    SHA256

    fe368967141be2296e47aea1cd1272b0a4cdd1336019ce63f36fd5b86d234657

    SHA512

    511c361786ad7a2cbbf249a7e5ae18410a149f228f14c759eddaea938c7f43d00e0d9ea3161e1c3c943c0c8c7a8892f94d71977f1035707a5da285f8155b60f2

  • memory/2076-0-0x0000000001380000-0x00000000013F9000-memory.dmp

    Filesize

    484KB

  • memory/2076-6-0x0000000001380000-0x00000000013F9000-memory.dmp

    Filesize

    484KB

  • memory/2144-7-0x0000000000210000-0x0000000000289000-memory.dmp

    Filesize

    484KB

  • memory/2144-8-0x0000000000210000-0x0000000000289000-memory.dmp

    Filesize

    484KB