Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 04:14

General

  • Target

    2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe

  • Size

    435KB

  • MD5

    ee704322f589481888f239cd10bef34a

  • SHA1

    4fd91f44892203b100d2b0dad400dc6be2e8e761

  • SHA256

    2ecd05b8597b99b4048b5702c3ba11ad57e5282791d183a5daf8277fa30aad73

  • SHA512

    bf21f0813beea49d235d2ccdb5e657f8bb87f2901809005eece645e1cc86b478f4db1efbfe0e69e027b0d5a66e43a06b90cdefd08ac490d576d5f1f10a53aad7

  • SSDEEP

    6144:fJvyW4ojUnQjx4qePix+qXQjBYe+wQKQhX8TzLwMD3bekKJXc/sObY9z0NrXw9J:fd4x+ePixnXQjcAQp8TPekKJMUOxxwP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\144C.tmp
      "C:\Users\Admin\AppData\Local\Temp\144C.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-28_ee704322f589481888f239cd10bef34a_mafia.exe 3A000445B26C1EFF236F8E4005A13DEC3EB0F324542A293918A1B0144B9E639A8A6F49D6B4F1587142A6D8FB91B72BE244822C0EFBFB06D6BC164674B1B4B31F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2644

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\144C.tmp

          Filesize

          435KB

          MD5

          68d56c10f4a1feb43dc5b314dcf3f935

          SHA1

          f775f4feedff6e1a51983430e5f439a32f4f20dd

          SHA256

          12bdd0a23d463a20e86a4a76bde715d0e1771cadf348194ec32faac068c199b3

          SHA512

          d0e20266ca9f14cef293fbcf0adaad094a66bbf39437b6581934777049a645734d6b91d649245954ee8f27257ac06b34910b20e5be4d4b81db29e69da645a047