Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 17:40

General

  • Target

    2024-03-27_a3efc159720c486a98d7115d4165c804_mafia.exe

  • Size

    436KB

  • MD5

    a3efc159720c486a98d7115d4165c804

  • SHA1

    dd8e7358e15110528fc2ac479109a315d7e9156e

  • SHA256

    e495674c2ecf8a0db3341a4488e4e59bfbc62add5027d0d8a1aa0f3abb68b8ff

  • SHA512

    6f02e30909a4583e6e9ae5d8320939421ff5fbb8eab1eb7884bd45fe31f70d964f9458959b7ed886221abb539cd6d15415ea01cea382d8b70e8b9750db8b207c

  • SSDEEP

    6144:a9EyS4oaxTkjxcW1Htg88HP7IFY4PPbEtD5pLTv1lPDOM415EjYfEFQlK:aO4GfBtL8HP4PwtD5FRlPaZ5G/QlK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-27_a3efc159720c486a98d7115d4165c804_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-27_a3efc159720c486a98d7115d4165c804_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\9675.tmp
      "C:\Users\Admin\AppData\Local\Temp\9675.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-27_a3efc159720c486a98d7115d4165c804_mafia.exe 2C07CF2A1C8632F2B5669052A40E07965BD31CBE2C0578BBD53FDB965DF29B04285624583324BE9BE7EA2B707BA8686630BE402F505B260992B8978C3349E80B
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1696

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\9675.tmp

    Filesize

    436KB

    MD5

    dcc111722fee77fd567fbca9059a2d2e

    SHA1

    6b889ddba642f0c64a3365e46911ae1e9bf98e42

    SHA256

    caf4eed660567a1266a89889b3d5ad56e1c5c84f5875eee9e1ae435e9ba12f9b

    SHA512

    167bd74cf3c3078d81e31e24160e8a7f1f8d524eb22fa38c23a034a974af0b9d2c8808359f238f421460e0bff722bd7a1b39321126026f5e18296a48817109e6

  • memory/1696-7-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/1696-8-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2244-0-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2244-5-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB