Analysis
-
max time kernel
91s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe
Resource
win10v2004-20240730-en
General
-
Target
2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe
-
Size
411KB
-
MD5
235ab673eb5ba950b114408de8c7e202
-
SHA1
05057df042c494ac723c0836275138e4757f5a7c
-
SHA256
36b51d64814d92b85553104ce48c5393189e2ed2e8ec5bdaeaf8f93eccf18666
-
SHA512
11058c9f8b004fab0d77fca0e3afddd520279325be2abeb05ea0de34236df35105ac87b9143c7311cb618b9229950aa58421a5bd7abd2d981554e9fbacfc10ce
-
SSDEEP
12288:gZLolhNVyEu1Me9dhWqj+ImO9xuRBSnlynOqHI:gZqhOEu1MVzO9CBSlynQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2968 7A3F.tmp -
Executes dropped EXE 1 IoCs
pid Process 2968 7A3F.tmp -
Loads dropped DLL 1 IoCs
pid Process 2744 2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7A3F.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2968 7A3F.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2968 2744 2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe 30 PID 2744 wrote to memory of 2968 2744 2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe 30 PID 2744 wrote to memory of 2968 2744 2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe 30 PID 2744 wrote to memory of 2968 2744 2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\7A3F.tmp"C:\Users\Admin\AppData\Local\Temp\7A3F.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-08-02_235ab673eb5ba950b114408de8c7e202_mafia.exe 9885CA1BF634B55680EEFCDF6CF1801BC3E1F56478E2F3240AA4AD22B51258B7439FCB53FE2A92B59240E3FFD24A473F3677856D8E827FCA02720CF4713097312⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5344d8d7b0a818ca6cc62c26ad7687878
SHA1ea7f56fb62d4913654eba581bd565e370cee9283
SHA25632ae2dfe098df4f0fb38c01cdec44e95b55c3afb38189a1d27f25b784ffdd334
SHA51203e03099e749b2a1b79e30287c90712b146d615c13749e8a77ed2c88771741b885ae4c5f75ad3741bdd000e8b5e0580b79a8f61300bc7bf50bd4287c8d2328da