Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 05:27

General

  • Target

    2024-04-16_f1bf16f85382c29ba25b19c8bba3d33f_mafia.exe

  • Size

    384KB

  • MD5

    f1bf16f85382c29ba25b19c8bba3d33f

  • SHA1

    aaf5db6c7d21d2969d572962a55e2bf4c454ef27

  • SHA256

    682ad93034e25c18ea9ef14ca113e9edd0057dd6a01d5645e0cda4ea8462dd78

  • SHA512

    e6e437b76f719ccf1dc8579e9bfcfbf8df4a7693970bd38b08f384b67d94cf8f9659b262514fe282b7355c63e641450fad833c66d4441fbfec0911bffc8d77c6

  • SSDEEP

    6144:drxfv4co9ZL3GBGgjODxbf7hHs2UB8e2GuX1SEmlkUwqidMauw6VXNZ:Zm48gODxbzhU8lGuX1RmXwdMNwaXNZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_f1bf16f85382c29ba25b19c8bba3d33f_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_f1bf16f85382c29ba25b19c8bba3d33f_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\1FEF.tmp
      "C:\Users\Admin\AppData\Local\Temp\1FEF.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-16_f1bf16f85382c29ba25b19c8bba3d33f_mafia.exe 25CD11E2127358151F04D358B94E7B544FE1B38CAEB5D3C296E1081B98E30F5226664495700A884C59F5BE8B35B4DC23E66B3F1E5ADCB6C3AD3689288509F24D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1FEF.tmp

    Filesize

    384KB

    MD5

    ae2d9776526d2e855fe5ba0de36c965f

    SHA1

    b0729dbfa36aa3cc82c7a4ddd85336a505e401c0

    SHA256

    d7fc3082b29e1d36a90c47df74e8aa71691c30cd64346040b3fbda8db3147d6f

    SHA512

    c710f3ec091e0f7dac000342870f4dd73fcb62038f3e8bc478c29790f696f238182768e938bb3e77c2b45bb9bf844184576dfbcf0d4cd66a512e6aa3fb29490e