Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe
-
Size
428KB
-
MD5
d33f6ecb773741116d57a2a90c95a9b1
-
SHA1
f6fa99e169058494884c872c52f0752fa952e6fb
-
SHA256
7d6bc434ba174480346f88e343c37618e48caedf2900cc9b3d606b109463a09f
-
SHA512
a1561c266c926595a59988c829865b5e3757ba7c60ecb0701bdece1f0aec443c4f0468c52dff4d12df7b66c765beb394ea962aa43fc4fb60df991b02fa696a4d
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFOJ5puY2r9W2eTS6TudzhdblBJNNEqNqHR:gZLolhNVyExYJr9WBTSUUFnpqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5016 A604.tmp -
Executes dropped EXE 1 IoCs
pid Process 5016 A604.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A604.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5016 A604.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 5016 1236 2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe 84 PID 1236 wrote to memory of 5016 1236 2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe 84 PID 1236 wrote to memory of 5016 1236 2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\A604.tmp"C:\Users\Admin\AppData\Local\Temp\A604.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe E26C88EE445CFFC34FC1A842DA21A633204F296959500B443EA695AA33218DF4D6912A93166C32FA49EB44D3EF542A3296041B1FFA5F354F2965B40AD74D463E2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD556720719c7d820c2370d9f0f78ed5cce
SHA1dbfa0e7d8b11c4147acec7d232edc873113d39aa
SHA256d4996c9212cef14e299ff1ad266424b9e4ddc2193ec442e3e14e029a6f82695b
SHA512c7a07b224de6bbb88c46cfc9b74f66f25443cb62177dece56d31e607e6f94587fdd8aa5dee686ec163f9fa0b355510b5b11e83eb9f5064e38e5c942a8447d95c