Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:34

General

  • Target

    2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe

  • Size

    412KB

  • MD5

    f8206898c9fe19d83dc14f4ba22508da

  • SHA1

    eb07c46c5b44bcab484f5ff9698b20762d79a283

  • SHA256

    733e65563081fcb7a77b32efc138b934f7f782778aa034306c85b50bd0320d68

  • SHA512

    09510d62803ac8575f5e6b7e824fa977a6988ec4d1e721d7c1b70f156290e9214cf5ede9d981ee14924028c4d29b42cabcc77d018c565c728fc62494249e476d

  • SSDEEP

    6144:UooTAQjKG3wDGAeIc9kphIoDZnBSiq3JOpgwu8dKQkMZGFp/3YFzUixFRP:U6PCrIc9kph5CkpJu8d0HFpwFzdHx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\4A2.tmp
      "C:\Users\Admin\AppData\Local\Temp\4A2.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-05-22_f8206898c9fe19d83dc14f4ba22508da_mafia.exe 004611C7718409307467DBB81531CC9985592C02C9189680592758E2807FF4981C9243B61C769C4F07D08AFFB4519FB3732A7047D35B100548D029DA9693CD82
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1228

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4A2.tmp

    Filesize

    412KB

    MD5

    8a5ab64c922a03ee46759127457a20ee

    SHA1

    18c76797c895ff1672c3f0fe05daeaa63f3d8cee

    SHA256

    8a2c41f000927abd7dcda57501131bf80e7a94b94404ed4cfd90fb6338fc77ad

    SHA512

    57068641287d2fe6812518d1194f1e808781f256a9972e5dbd450f7b6c5f95dc8c5028673670072d0a3072819d9fbe61336255ac877fd39ac4fa63dfa4dd973a