Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    06/04/2024, 02:35

General

  • Target

    2024-04-06_50dcd96bd1be3ed3488c439864c0c24a_mafia.exe

  • Size

    526KB

  • MD5

    50dcd96bd1be3ed3488c439864c0c24a

  • SHA1

    fd8d2dbbd97b0c7d8922ffdc695fb38f67dbdfda

  • SHA256

    3d1387aac608834a1ed7531ab9a3e54d59ef980d5f729a499feb9a2d75c2718f

  • SHA512

    960df2c0a84b2d837d974f81d4b7802e8aa055675b001c22356929c905845d9b693e4bccc7ad2abcfe706f7266f6a200d7e1f4072e1de5b041064408c674b74b

  • SSDEEP

    6144:zooTAQjKG3wDGAeIc9kphIoDZn7a0NpEoTqiI5HaJfXtwIgSQeFCE7cpP6+:z6PCrIc9kph598oTq/FaVDgheF8z

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_50dcd96bd1be3ed3488c439864c0c24a_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_50dcd96bd1be3ed3488c439864c0c24a_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\2C3E.tmp
      "C:\Users\Admin\AppData\Local\Temp\2C3E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-06_50dcd96bd1be3ed3488c439864c0c24a_mafia.exe B07D078D9E0D345BD703056747FB2594C9EEF0D63B6B53A979B5C7E55B599AC4C746F94E893A7DA65980953C3B15E885263F39F16FC769E377846E6ECB9BC7AC
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\2C3E.tmp

    Filesize

    526KB

    MD5

    fd69f60402a2c40e0ac1fb69d9d6c35e

    SHA1

    5099a446c123302f30619ebfc1204cca5b594c3c

    SHA256

    9116297f6d5b4252a11145833b092ed47d4bdf415d24e9ba1c5efb649e570a6e

    SHA512

    bb1a7c4ae53b678b11719f48d8f884537d145bde9bec87ab93354af064c0d67422fe9aa675610c2aa60fbf4b2133b77249c513d5db3be58fbf43a55e7b5c71f6