Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-04-2024 22:41

General

  • Target

    2024-04-23_05e55c1ad5b198c9bd3f62e9e3cf3ec0_mafia.exe

  • Size

    443KB

  • MD5

    05e55c1ad5b198c9bd3f62e9e3cf3ec0

  • SHA1

    ea6abc58c8b230ca0be71a01d6a2c6c0f83eea6f

  • SHA256

    d1b1759c523d06e0b9bcac4578d83c05b0d38619878c4cdc6e5d301a2e01c754

  • SHA512

    c35e3ff6a80a143bc448997e8f783d2a811a059814f5bc43a12451e95d59918b34f36d599af94a90f9f66593fb1a736909c822746d293b72eb4aa3c2facea13b

  • SSDEEP

    12288:Wq4w/ekieZgU6wn76tjzhTQohwEzynSk0F5lMa:Wq4w/ekieH6m4jVTQLEz4CF5P

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-23_05e55c1ad5b198c9bd3f62e9e3cf3ec0_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-23_05e55c1ad5b198c9bd3f62e9e3cf3ec0_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\AppData\Local\Temp\EDF.tmp
      "C:\Users\Admin\AppData\Local\Temp\EDF.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-23_05e55c1ad5b198c9bd3f62e9e3cf3ec0_mafia.exe E73E38D1B75D0B16A9C6BE53D69EDC9F53AEEA17EEAC4A75F4F01BA2B7258153E923CD4096C15B8D7DDC0F0E0535217EC93B631F3154C658410E27AD82E3E66E
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EDF.tmp
    Filesize

    443KB

    MD5

    f3c85e2175c4c9a7cc582ddae7e76370

    SHA1

    01789d90326f693f95c6e81680070200fd8847b0

    SHA256

    ce48f20f513fc8f8564903ba0fc4fab2053cdbe93ddf2d647cfdd9b64f5ddd4f

    SHA512

    b55e28b657cab30c5bdae30061db582108be2d2907bb415579a15bea8ee735a46bc90af0b61f6de96d5b61eed51a3f49bdb55688e0799aec354b6ee75cc564c3