Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 17:28

General

  • Target

    2024-04-16_5a69939fbafec1d30787892413a1f1f5_mafia.exe

  • Size

    411KB

  • MD5

    5a69939fbafec1d30787892413a1f1f5

  • SHA1

    2816de03a51154c8e26c1f1bf14ea0a297d171aa

  • SHA256

    bda45407d060b587cb3fbb95e320130079942fe99e04831209ef52fbba07babe

  • SHA512

    325a68680de075302adee33a8e8a0d63d46e08fe041de63b5e35d21dc5ac2f907ad29ac59901f329cfaac21229b5dd9b410b35f57cacf97bc095fe65ce3850d2

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFpPuNUrOdIucf0/TTdjs8rUE6qHI:gZLolhNVyEiieM/fSCmqHI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_5a69939fbafec1d30787892413a1f1f5_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_5a69939fbafec1d30787892413a1f1f5_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\46EF.tmp
      "C:\Users\Admin\AppData\Local\Temp\46EF.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-16_5a69939fbafec1d30787892413a1f1f5_mafia.exe 7DEC3E61E72B627DAA76CBE2A0F686903759FCB78E984AB5FDB0785D25CC3566987BEBBDF74C01502F5792E9469A67B294AAEBE4575AB88F2239B167E75F06F8
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\46EF.tmp

    Filesize

    411KB

    MD5

    a196e7fabb5e10799eadd5d815f1c845

    SHA1

    03a49bef2b8db49975dd61ce7f61e70f537a85b9

    SHA256

    2fd8cf59948670e3426035c7c98a077d9d13a5a753f931b189b465a85d64c1c1

    SHA512

    0dbc12f97d9be7a7af25a99d9c47df2ff15259b78388ca62ff1c6c431de80d608591e21923b2fa192bc197e769c7969b570b0aa0718b3e69bc8bb2ecbf3d55bd