Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 04:23

General

  • Target

    2024-04-19_016ba7b6d58648438cc5f15ecde0cef0_mafia.exe

  • Size

    486KB

  • MD5

    016ba7b6d58648438cc5f15ecde0cef0

  • SHA1

    4a9bd9c97c19b5f7b5da2d90a954f4af88b35b3d

  • SHA256

    a98afdb6577d52de7ac69a74b53261ee19d05a6c320b563d93e15e077f755eb8

  • SHA512

    5b765316d3858d96ec9558a0101ba6a218886270a7a56fa9ac49dd0413c2cc82c509af0f4cc4b2a874828d0ac12e9818b86401c431ae4c5633c4b3b18161cca6

  • SSDEEP

    12288:3O4rfItL8HPuZBm3kI71ZnJlUupF1b7rKxUYXhW:3O4rQtGPuZQD71ZnguF3KxUYXhW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-19_016ba7b6d58648438cc5f15ecde0cef0_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-19_016ba7b6d58648438cc5f15ecde0cef0_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Users\Admin\AppData\Local\Temp\6190.tmp
      "C:\Users\Admin\AppData\Local\Temp\6190.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-19_016ba7b6d58648438cc5f15ecde0cef0_mafia.exe 15B27535940AE4F667DD4AB19613E9258858C3DAAE0A5C961389F105C39B130409031F029DCEC64F94AD98FC4A366CF18069FB718C2BE0C33E9AFB9586CBCB85
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2356

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\6190.tmp

          Filesize

          486KB

          MD5

          7fec03afe5dcf07244695767e1de935b

          SHA1

          98ce648e1156ff7df65c50266d8df70afb7d9416

          SHA256

          67fbfe7729c07d6aa22054cc7755aa286f00243d0d7908b775e395a392e27014

          SHA512

          764aefb6c9e9633f9abdf29bf42a880a01da8adfcececfcf5d555f2fb7f27ac24fa6756f05681c8c0ec256e905400ebcaa2c9ef8b00f89c4b41e1daae8822021