Analysis

  • max time kernel
    140s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 07:45

General

  • Target

    2024-04-09_ffd14891320a3971f9915c82d3de6da4_mafia.exe

  • Size

    3.6MB

  • MD5

    ffd14891320a3971f9915c82d3de6da4

  • SHA1

    739512ea3a4e690c68dd154a6e4e66f44be7a8cc

  • SHA256

    7596b7db23102c806efb97df132bb8c7faf443725df5d1e7bc0cf34a9cef7676

  • SHA512

    7a30a2a419bf9fde00a9cbfb1729a177893886550bb9dac2dd7e1a85ca6cdfdb60cdaf3c7428621cc85fe0ffa02cc9cbab69462e61197828272e25a7f94ce99b

  • SSDEEP

    49152:sm8CGs4YEvhDiLXq/jCwuvi7XRYiTWTKOj/One8knPTheUy9op7vxTbM6DrzXkTw:58ds4YaM5a7XRr6KOj/j8knTjw6Dnil

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-09_ffd14891320a3971f9915c82d3de6da4_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-09_ffd14891320a3971f9915c82d3de6da4_mafia.exe"
    1⤵
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:932
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3804 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4424

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads