Analysis

  • max time kernel
    91s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 04:03

General

  • Target

    2024-03-15_0afe3d816fb83dab8b33e68dde7d0a87_mafia.exe

  • Size

    4.4MB

  • MD5

    0afe3d816fb83dab8b33e68dde7d0a87

  • SHA1

    c15bac8712a7d910af03fa3385a967403b27d44f

  • SHA256

    eeb82986e46895c45431ccca5eeaa4d8d67226a40579ccdb6361ba956c3a1949

  • SHA512

    7f738b38db43c7e299589b59a77f18253c289d9f147cef6f506f3825c6ec05b5222ee21e611c2db93c5bb13f235081f0ada07ab25d01e4c50ec9cabb5fdc8c8f

  • SSDEEP

    98304:4k+iHL5HWLxR8owzh+3GDTZXxhSlaLE67i2/6HL:p+iHFcxRNfGDTtxhKoW2iHL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_0afe3d816fb83dab8b33e68dde7d0a87_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_0afe3d816fb83dab8b33e68dde7d0a87_mafia.exe"
    1⤵
    • Checks computer location settings
    • Checks for any installed AV software in registry
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:5040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5040-0-0x0000000002860000-0x0000000002861000-memory.dmp

    Filesize

    4KB

  • memory/5040-4-0x0000000002860000-0x0000000002861000-memory.dmp

    Filesize

    4KB