Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 03:54

General

  • Target

    2024-04-23_cb2e5879e797ad03b77bd6553df5a27a_mafia.exe

  • Size

    433KB

  • MD5

    cb2e5879e797ad03b77bd6553df5a27a

  • SHA1

    ce3f50fa7e0bcfcf5607c81d62970e206ace0491

  • SHA256

    f70f8338cae3c24f0e1519c8a2f6b3449bb244bd9cb31c5691d6b936fde162ea

  • SHA512

    2e2381e93fac8de3e9995f54be9dfd726b791ad1473bcf3c25bfd221382548d44f4a98d98e5e827162c765a10a0fc46d2929b78e1edad12ff3ad430ae2c84cf7

  • SSDEEP

    12288:Ci4g+yU+0pAiv+PU5sZlsvsk1QtbDhvuzJt/mn:Ci4gXn0pD+PuWKsKQtbdvuFt+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-23_cb2e5879e797ad03b77bd6553df5a27a_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-23_cb2e5879e797ad03b77bd6553df5a27a_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\1536.tmp
      "C:\Users\Admin\AppData\Local\Temp\1536.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-23_cb2e5879e797ad03b77bd6553df5a27a_mafia.exe B518D3497AD132526AB5D712FF07E515FEBCD21D1683FF18AABB0504E6257ED89C89AEA4E877C3CE232910272AA162C5A3B3B8838F0E926FD598955E62DE34CD
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3044

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1536.tmp

          Filesize

          433KB

          MD5

          44a7b303a366483ea682b344ff45da07

          SHA1

          e5773c0f6dd9055c55eb632d8f8d4e9582d5c9df

          SHA256

          515c33eff6431fa822177cab056a86ff9a2e7c5ccc72153786a257a0223e5fe0

          SHA512

          73bb6a9fb6be28142f7d61f3383d088f0dcaae46af4f055668b6a096b831b51299812510cfb93b6e4d1505170287a29e844c56c6bda55debd0bdba645b4f7daa