Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    06-04-2024 01:46

General

  • Target

    2024-04-06_ce58468fac4cdcdc121f0a1afe76e90b_mafia.exe

  • Size

    433KB

  • MD5

    ce58468fac4cdcdc121f0a1afe76e90b

  • SHA1

    8344068da65752ba0720fceaada6a037237c3d62

  • SHA256

    1ffe7682494e1c7a666c7be8f418d00c9055d4aa5e5d970c8b8c1e186b082058

  • SHA512

    58c0921742c94755e5bb20ca9a9ab7a8ba01ab8bf93e79e89d4575cdf2059e7ea3d6d6aeefe49f183d4c1e1e56a157e81f5b109f4343102ac59fa2dafc901607

  • SSDEEP

    12288:Ci4g+yU+0pAiv+hyX+NUxRZXzE+WRePXQY/dmT+Prn:Ci4gXn0pD+hIQULdI+Se/Q0d7T

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_ce58468fac4cdcdc121f0a1afe76e90b_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_ce58468fac4cdcdc121f0a1afe76e90b_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\11BC.tmp
      "C:\Users\Admin\AppData\Local\Temp\11BC.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-06_ce58468fac4cdcdc121f0a1afe76e90b_mafia.exe 36E5C11D895882022203C33B3A5FB8F26B455CAF9E4AACD2D65C387BE8F5D600B6453F2ADBB3ACD28FD0F00E05A19C04B4EA688198A38F3D310DE5F710709469
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\11BC.tmp

    Filesize

    433KB

    MD5

    0fcef3504acc272e8c345d4e1e6a0ab3

    SHA1

    dd6055fd0657b9a8d2a3b7c5760c1c3b1532caaf

    SHA256

    d6ae67c53c804d9c83065e0c0468a4df100a00a9ceac2f802990391090ae7aeb

    SHA512

    22c50b24742e97d688265376d99956b554d2d8a6324d804d5386bb97b43ed077f751bac8571d4b0020742463a2bc02f9ef1e5a69eb1b2599ab0954b006391688