Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 21:55

General

  • Target

    2024-03-28_f43895877400d2ae0007edd41b95cdba_mafia.exe

  • Size

    435KB

  • MD5

    f43895877400d2ae0007edd41b95cdba

  • SHA1

    54687fabdec52536885a5ffd558dfb3c98c3ae95

  • SHA256

    b234d2bc97d5acd745af3ed4353e757d7fea453c35311f0872c2cc04d191e1eb

  • SHA512

    41af1218cc5aa83a8a69205bb7e15c978aacc996702ed41087dde7608b63ae5623fe5c1397ea5929eda757da8385d2a3b0140f85bcf543d220b6d0fe73a6076d

  • SSDEEP

    6144:fJvyW4ojUnQjx4qePix+qXQjBYvlO8fvhnRxvsQJjjtfvlSqjNqw9J:fd4x+ePixnXQjyRnPLjh3tjwwP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-28_f43895877400d2ae0007edd41b95cdba_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-28_f43895877400d2ae0007edd41b95cdba_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\1880.tmp
      "C:\Users\Admin\AppData\Local\Temp\1880.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-28_f43895877400d2ae0007edd41b95cdba_mafia.exe 385E40DE37DDBE25916158CE907981027AE07BBEA3E64F8678B1F6B7BF2A42FDA491687AC345D593AB56B482D3F6EEFEC61C84418F689E9A7C94BCCBAFD473A6
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1768

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\1880.tmp

          Filesize

          435KB

          MD5

          279cff8d394eb7eb7ce5c51ad5e71a17

          SHA1

          57b29441eb6253c53e7bb9d19438f48390b35bb9

          SHA256

          b77416f74732818064b1407ad4f1556ed43d79ec81a342480abb8154e7358a28

          SHA512

          4ad4f9340fd00d9acb1276bf3e650f4eb3cfdee29ce1f547117ebc24ed0016650829fc7c8f99d15520ddc06f35ee9a44c5d2e58ffc5b9f7b0be50c0c183956f6