Analysis

  • max time kernel
    145s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2024 03:22

General

  • Target

    2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe

  • Size

    428KB

  • MD5

    d33f6ecb773741116d57a2a90c95a9b1

  • SHA1

    f6fa99e169058494884c872c52f0752fa952e6fb

  • SHA256

    7d6bc434ba174480346f88e343c37618e48caedf2900cc9b3d606b109463a09f

  • SHA512

    a1561c266c926595a59988c829865b5e3757ba7c60ecb0701bdece1f0aec443c4f0468c52dff4d12df7b66c765beb394ea962aa43fc4fb60df991b02fa696a4d

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFOJ5puY2r9W2eTS6TudzhdblBJNNEqNqHR:gZLolhNVyExYJr9WBTSUUFnpqHR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\A604.tmp
      "C:\Users\Admin\AppData\Local\Temp\A604.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-08-10_d33f6ecb773741116d57a2a90c95a9b1_mafia.exe E26C88EE445CFFC34FC1A842DA21A633204F296959500B443EA695AA33218DF4D6912A93166C32FA49EB44D3EF542A3296041B1FFA5F354F2965B40AD74D463E
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:5016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A604.tmp

    Filesize

    428KB

    MD5

    56720719c7d820c2370d9f0f78ed5cce

    SHA1

    dbfa0e7d8b11c4147acec7d232edc873113d39aa

    SHA256

    d4996c9212cef14e299ff1ad266424b9e4ddc2193ec442e3e14e029a6f82695b

    SHA512

    c7a07b224de6bbb88c46cfc9b74f66f25443cb62177dece56d31e607e6f94587fdd8aa5dee686ec163f9fa0b355510b5b11e83eb9f5064e38e5c942a8447d95c