Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-04-2024 15:30

General

  • Target

    2024-04-22_41d4f96136be8c49a84532ef28d8016a_mafia.exe

  • Size

    473KB

  • MD5

    41d4f96136be8c49a84532ef28d8016a

  • SHA1

    c5b58d59da1fc69fb4d562a1d0068832857cb800

  • SHA256

    53ca384b882402576ff80f30b0a4dd247c51895a00206773b69234c6b4ab8c6e

  • SHA512

    039921537380af50c5b2f2648d20c6e36a4c376bc197cb3661e6928bdc350861e6926384004d3ada3e1a8f5e71c562ab54395137935a04ad0e26ceda6e385c35

  • SSDEEP

    12288:Nb4bZudi79Ln9pDBEoHx8Tq6cR9Snd07BrdmA0a:Nb4bcdkL3DBx8KaiL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_41d4f96136be8c49a84532ef28d8016a_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_41d4f96136be8c49a84532ef28d8016a_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Users\Admin\AppData\Local\Temp\1094.tmp
      "C:\Users\Admin\AppData\Local\Temp\1094.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-22_41d4f96136be8c49a84532ef28d8016a_mafia.exe 4B2CF69B7534F47DA8A4E8B1F6C5FC3A32052D549C5EEB9F601C166C25F584E9D9564FDCCC9084444FFB65BC3EF8A4F0D69B8A5EBA4C005750339329223155EB
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1094.tmp

    Filesize

    473KB

    MD5

    780444b2633b8bac2fe0a6b3a87e657c

    SHA1

    35f085a8c10de115102daf21f245c63591947402

    SHA256

    422aae7fb116503caf81ff2df3427c76e6ead9e3b7addc5de1054f814fb097b2

    SHA512

    04f5f4454916aa1a0cf1385fc1b145f8630be3d68829e065d0522eae9f690d329d9b2791877dc5cc49c40a4bf844e49c9fba207e4de21c5701694f0ae29bcb6e