Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 21:45

General

  • Target

    2024-04-22_d4079318d66d5c32c92ee0e45a017ed8_mafia.exe

  • Size

    433KB

  • MD5

    d4079318d66d5c32c92ee0e45a017ed8

  • SHA1

    cb251610e84d940deec2136ecc400c34c1e16611

  • SHA256

    c6b247f47e0307939deebf14af2e55a34260a0b8b207f9723d2fa7b81b0a6ae6

  • SHA512

    fc6e482bbb1d9f0d6797e34f46c3d44fd50e852449771d25017c15b141e8005f625b3a9f55552776edbc36f840ab5416a27be6413d0c786fc75b667a058faaad

  • SSDEEP

    12288:Ci4g+yU+0pAiv+R/gr8pgc0BT+zz0zBSoA22Ji/GDiWn:Ci4gXn0pD+JgrzBizz09S62JvP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_d4079318d66d5c32c92ee0e45a017ed8_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_d4079318d66d5c32c92ee0e45a017ed8_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\2EAE.tmp
      "C:\Users\Admin\AppData\Local\Temp\2EAE.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-22_d4079318d66d5c32c92ee0e45a017ed8_mafia.exe 22A9570E88B8F56D1841DFA8765AAAB1A4626713801B0C3C3996B2FD9694A3EA66018CB7531127691F814C9B5B501E8C09A96621716FF77869AB506A7F9DF512
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2388

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\2EAE.tmp

          Filesize

          433KB

          MD5

          21a5a400623a6731a2eb8cc99e6e1b3a

          SHA1

          c7d1de31c1a39b3ec25788df10be8798c45da195

          SHA256

          514b951fbcd7cad82831cb942c9a998704a23f455e3d34b5622ed8d8f6431760

          SHA512

          ee679ebbf35660eb9b4fa5a7e8a8203eea9b58b362cb0c670fe44dd81feed0c1bcbfed5dd3636e4fafa6846f73e3b08951ba8022cd4792f550d818e5cf1b4db3