Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-04-2024 02:34

General

  • Target

    2024-04-11_66beee06d199152ba6237aad44021cd5_mafia.exe

  • Size

    433KB

  • MD5

    66beee06d199152ba6237aad44021cd5

  • SHA1

    9471749e51e2b241c5cc62d63a08af764248ace2

  • SHA256

    85e31ae60d4ac9a5a788e2abc0d7fe5b70fbfe070d14e374cc23ae1ce7e58d5a

  • SHA512

    350774d0482db2a0a319b109d11320c7df4fcd5dfa3d35efba4ba4a9461c54de1e74189492901c4c468ec7c65c2b05cdde651e4a07fc59d5643011dcc2cd0e42

  • SSDEEP

    12288:Ci4g+yU+0pAiv+IplXFgNlXkTowxaeGaIs5x4Yn:Ci4gXn0pD++lSHmxaeGaIs5uo

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-11_66beee06d199152ba6237aad44021cd5_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-11_66beee06d199152ba6237aad44021cd5_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Users\Admin\AppData\Local\Temp\E82.tmp
      "C:\Users\Admin\AppData\Local\Temp\E82.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-11_66beee06d199152ba6237aad44021cd5_mafia.exe 862323DC833BA451383C601721071E66F3A0510EFE4F4FA27785981D51647EFB696922989DD49555E581643BFC3548E55E6293D52CBB02425FD8FA29B5333797
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E82.tmp

    Filesize

    433KB

    MD5

    30332446512b756ced673f014d4386d8

    SHA1

    7f32562a9ef07d32fa17e7d8961b5630ff4032f8

    SHA256

    f360adb0e2ab64800c93a96027171ea8f7f34b90d40da26e2cf8c25c757ec41c

    SHA512

    8780c81a857188e44b9ebe3febf4dc3303dc03d422ddfd6cf9e7ed23ae4f05abfd57ed3b4ed5580985aa1384fca18e59d3addaaa7e6d418d255fd8b14b1f736f