Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe
-
Size
411KB
-
MD5
08dc6c6d6eecc8f424a7db2c0394cf1e
-
SHA1
58ffd4bb30dcfa98edbf4c10c63c8118dd840cdf
-
SHA256
cc4a76599b9289f447a70d0d9fe15d8a82abf2790e8e732bc1cbdfad8c57ec6b
-
SHA512
89ae128658bc618116604a5fbd304dafa8abae4d30773f79edbf35684d6add446975d7147f8f84c416386a4e41bab6f4d8376bcc94cab0bae71e2c8c0be7cb24
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFQgPUi7tLoGZrJuGUnkXsWUoLwLOE9lVQqHI:gZLolhNVyEUPUytLxJvWSLgOu7QqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2092 B895.tmp -
Executes dropped EXE 1 IoCs
pid Process 2092 B895.tmp -
Loads dropped DLL 1 IoCs
pid Process 1976 2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B895.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2092 B895.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2092 1976 2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe 30 PID 1976 wrote to memory of 2092 1976 2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe 30 PID 1976 wrote to memory of 2092 1976 2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe 30 PID 1976 wrote to memory of 2092 1976 2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\B895.tmp"C:\Users\Admin\AppData\Local\Temp\B895.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-08-10_08dc6c6d6eecc8f424a7db2c0394cf1e_mafia.exe 2ADCF9001A93A89C8D0416520947CD951C1DB2822B62297FB5CF0F91229B57FB380731CB3CD99FC97BAD22FBFCDDD09ED939664BB2388826B727540F51C317D72⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5520944b0baaa991e2da6fef832348864
SHA14678aacb405fb61c68f3b6b5fe34d0a5298cb4b7
SHA25693aaab6d2d1b91eefb832f82f7c33cd5265885ccda98aed169b3cc7f51b51887
SHA51218cb12685eb4001b796fcd4b030da121e50120541912b02ac7d7b6ea168e3bb1ac0632053f708ad688bdbde60fb1ea3a4942f30db7bc9b2afa731f7f27ee2c0b