Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 18:46

General

  • Target

    2024-08-09_243605e28892ec1bf299c536ad666ad1_mafia.exe

  • Size

    411KB

  • MD5

    243605e28892ec1bf299c536ad666ad1

  • SHA1

    bbd3706032ef19592d62f5ddd1ee3a296670e50b

  • SHA256

    80bd25eb1bc71e9cd082f401101d61dcd998ded3a15278b4e9918618a965e20e

  • SHA512

    d4771bada0bbf3c3e9c06cf86a6ec27ae3ff8a54744400485c434d6f3d7aac53cc1f69ba3dd6b41ca375373099466a7297cba0eacc8d1d4d1c3a490b11b4c848

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mF1R4cFpzBRz9CLpTo4nVl95lFqHI:gZLolhNVyEQtBCL1o4nhFqHI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-09_243605e28892ec1bf299c536ad666ad1_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-09_243605e28892ec1bf299c536ad666ad1_mafia.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\A17D.tmp
      "C:\Users\Admin\AppData\Local\Temp\A17D.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-08-09_243605e28892ec1bf299c536ad666ad1_mafia.exe 4F5A2FC470E9824A545D9FB3134E7BBF84184DE2DA952F5998F18AB5D457E323808AE1627F1C6DCB6F34F4971C2C5296269B15561CD07180149BEB392714EC4C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A17D.tmp

    Filesize

    411KB

    MD5

    92ccaf356fb03f62a645e717fe522ee9

    SHA1

    35045a97a839cd84922ab1bab7986f827c18db7b

    SHA256

    cca6d64e3b1f15bd96cd7cb0693fbe37ee0f9c3c3dc85586534a014e81b91292

    SHA512

    0b73990bc914df8390736d85c53c9ca1c47bef37070e03ae8954eae569764e5a2bce920bd00a523b88c041208933eb0daab2729d9fc3b360c9ad1e489681f0c7