Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/04/2024, 03:01

General

  • Target

    2024-04-06_f4d6a7a9562b27fad42d22afe6148308_mafia.exe

  • Size

    384KB

  • MD5

    f4d6a7a9562b27fad42d22afe6148308

  • SHA1

    d2befb9b8269d3d97ed305a4aaf2680552af1086

  • SHA256

    3bd4686c4cd43a9601a64ddffd47f53ed379d3ecb00393879a0cb835eb038321

  • SHA512

    0f70c2835f4064d0301869ad8f0a1b719ce3d3c080e8dea50e9d2af1c53d3b9760918a92079a87266c823dae19a89d16c8549be4995028a06ba3ed517bf215e0

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hHoYLJkIEJWZOImVYrXCePwMtf3hONZ:Zm48gODxbzxJkNEFHCaZfhONZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_f4d6a7a9562b27fad42d22afe6148308_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_f4d6a7a9562b27fad42d22afe6148308_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\22CC.tmp
      "C:\Users\Admin\AppData\Local\Temp\22CC.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-06_f4d6a7a9562b27fad42d22afe6148308_mafia.exe 69CF2F8B226A15532566B3FD434A2E4B353098B01272BFBEF821EBF080C4ECC0A3D26A61F6B7CB8C84BBC6005FB00D055305CC48E93F368820944E7C3E8C1A98
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1732

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\22CC.tmp

          Filesize

          384KB

          MD5

          d20f9d37300e48d17d7be6e0cb17d470

          SHA1

          1dc9cb9a67f71953399f41901376aba9b78c1196

          SHA256

          73176bb756fb02f1b1b21a00d3a1dca81a3c2a1d11d09811f6fa663dc85d983d

          SHA512

          f582673bae1ae29909ad0656ec0252ebdedf13b57af2b7e4ad4bb5832a471ceb5107136ac0722aeb096e2ddf6672818cec669ac976bbb279826396ab66ae0673